Similar Posts
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Banking Social Engineering Scams are Alive and Well
The easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…
Is Blockchain Secure
The value of Bitcoin and other virtual currencies seems to vary a bit. Three months ago, Bitcoin was trading at about $47,000 and today it is trading at about $21,000. But, while that could be a big problem for some speculators, that is not what I am concerned about. The core behind all of the…
Creating a PIEE/SPRS Account and Entering Your Score
Here are two videos; the first one shows you how to create an SPRS account; the second shows how to enter a new score. NOTE: You will see that I got an error on the PIEE administrator role in the first setup. That may be due to the fact that I already have an account…
Dark Patterns
Ever try to cancel a subscription online? Or even figure out when the subscription is due to be renewed? That difficulty is intentional and is now against the law in many states and countries. If you operate an online presence, it is important for you to understand what you are allowed to do and what…
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.