Smartphones Targeted by Drive-by Malware

Cyber “Events” that Shape History Only a few events in the history of “Cyber” and “Security” cause security professionals sit back, meditate, and try to understand the implications of that event.  …

SMB’s Attacked 15x More Often

Small to Medium-sized Businesses (SMB’s) are attacked fifteen times more often than smaller firms (>10 employees) and larger firms (<100 employees).  In 2018 they accounted for 43% of all security …

QR Code Scams

The latest way hackers are breaching your private information is by using malicious Quick Response codes, more commonly referred to as a QR Code. QR codes were first created back …

Three Tips for the Digital Age

CyberHoot received notice today that our Café Press account had been breached along with 23 million other accounts. Fortunately, no password data was reported stolen. However, phone numbers, home addresses, …

Capital One Breach Affects Over 100M

On July 29, Capital One announced it experienced a data breach affecting over 100 million customers. While that is an enormous number it represents only 1.4% of nearly 8 billion …

Microsoft Bug “BlueKeep” May Affect Millions

Overview: On May 14, Microsoft issued a software update patch for its Remote Desktop Protocol (RDP). These patches fixed RDP vulnerabilities in older Windows operating systems including Windows Server 2008, …

Passwords, Passphrases, and Password Managers

Cybersecurity skills needed for the 21st century include learning how to use a tool known as a password manager. This skill will provide you huge benefit in security, productivity, and confidence online.

How to Recover a Hacked Email Account

It’s Friday before a long weekend and hackers are up to their old tricks! Hackers just love to hack into our email accounts before a long weekend to give themselves …

Domino Breaches: Stop the Falling Dominos

This article articulates the steps to immediately take when you’re under attack from this form of attack… something I’ve nicknamed the “Domino Attack”.  This attack has distinct phases which the hackers …