iOS app Android app

Michael Gregg
Michael Gregg, CISSP, CISA, CISM, is an ‘ethical hacker’ who provides cybersecurity services to Fortune 500s and US government agencies. He’s published over a dozen books on IT security and is a well-known security trainer and speaker. Gregg is COO of Superior Solutions Inc. (, headquartered in Houston.

Entries by Michael Gregg

How Data Brokers Threaten Consumer Privacy

(0) Comments | Posted April 11, 2016 | 1:28 PM

Let's face it, over the next few years, it's going to become increasingly difficult to protect your privacy online and in your day-to-day life.

From smartphone apps that spy on you to wearables and fitness trackers, corporations mining your social network likes and connections, as well as online searches,...

Read Post

The Future of Digital Spying: Home Edition

(0) Comments | Posted January 25, 2016 | 9:43 AM

Forget about the NSA.

When it comes to tracking your personal information and habits, the refrigerator in your kitchen may soon do a better job than Uncle Sam.

With the rise of the Internet of Things (IoT), the world around us is getting 'smarter,' better connected and feature-rich. This is...

Read Post

Six Ways You Could Become a Victim of Man-in-the-Middle (MiTM) Attacks This Holiday Season

(0) Comments | Posted November 12, 2015 | 12:27 PM

Millions of consumers will soon be shopping for holiday gifts from their phones, tablets, laptops and (let's be honest) work PCs, but retailers won't be the only ones trying to get your hard-earned dollar. Cyber criminals typically come out in force during the holiday season to steal credit card numbers,...

Read Post

Six Ways Hillary Clinton's Email Could Have Been Hacked

(7) Comments | Posted September 2, 2015 | 11:35 AM

As the FBI investigates the private email account Hillary Clinton used while serving as Secretary of State, more questions are being raised about just how safe and secure her private email server really was. Of course, the biggest question of all is, could it have been hacked?

While the...

Read Post

Top Six Ways Hackers Could Disrupt an Election

(1) Comments | Posted July 21, 2015 | 12:32 PM

Could hackers swing a U.S. election?

With the 2016 presidential race already well underway, it's time for us to take cyber threats to our electoral process much more seriously. Over the years, a number of security researchers, 'ethical hackers' and government agencies have warned about the risks, but little has...

Read Post

8 Things You Should Know About the Office of Personnel Management Breach

(1) Comments | Posted June 26, 2015 | 3:05 PM

Is it the biggest breach in U.S. history?

For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data. When first announced in early June, it was believed...

Read Post

The Scary Truth About Computer Viruses and Malware

(1) Comments | Posted April 27, 2015 | 11:13 AM

Antivirus is terminally ill.

There are many who will say it's already dead (some will even say that happened a decade ago), that the bad guys have won and no one can trust antivirus any more. As a computer security professional, I wouldn't advise anyone to surf...

Read Post

How Hackable Are You? - Calculate Your 'Pwned' Score

(0) Comments | Posted February 5, 2015 | 11:24 AM

The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?

Cyber attacks on major US...

Read Post

Five Ways Cyberterrorists Could Target the U.S.

(1) Comments | Posted September 25, 2014 | 11:50 AM

Will the next terrorist attack occur in cyberspace?

As the Western world becomes increasingly concerned about ISIS and the potential for homegrown terrorist attacks by its adherents, governments and their publics have focused their concerns more on traditional physical attacks, while overlooking the potential for cyber-based assaults.

Cyberwarfare is now...

Read Post

Cyber-Ransom and Online Extortion - 5 Ways You Could Fall Victim

(0) Comments | Posted July 2, 2014 | 11:43 AM

Imagine turning on your laptop one day, only to be greeted by a bright, red screen with a warning message: "Your personal files are encrypted! ... The private key will be destroyed in 72 hours."

What would you do?

Cyber-ransom is a relatively new crime on America's digital...

Read Post

Do You Have a Right to Privacy... From Google?

(2) Comments | Posted May 23, 2014 | 1:33 PM

Recent events, such as the U.S. House bill to restrict NSA data collection, Facebook's decision to make it easier for users to share less personal information and Europe's top court ruling that EU citizens have the "right to be forgotten" by online search engines like Google, highlight the question: What...

Read Post

Should We Blame Russia for the Target Breach?

(1) Comments | Posted February 14, 2014 | 2:48 PM

Is it time to hold the Russian government responsible for the rise in sophisticated cybercrime attacks on the U.S. economy?

As Congress recently held hearings on the Target data breach to discuss new ways to protect consumer information and prevent future data breaches, one key issue that should be on...

Read Post

5 Lessons from the Snapchat and Target Hacks

(1) Comments | Posted January 6, 2014 | 3:16 PM

The new year has only just begun and already four major brands -- Snapchat, Target, Skype (owned by Microsoft) and Yahoo! -- have fallen victim to hackers. They join a seemingly endless list of other businesses, from big (Google, Sony, Lockheed Martin, Visa, RSA, Barnes & Noble, T.J. Maxx, etc.)...

Read Post

5 Ways Could Get Hacked

(5) Comments | Posted November 22, 2013 | 5:12 PM

Glitches and outages have been the main focus thus far in the scrutiny over the website - but a bigger problem could be looming on the horizon for Americans who wish to enroll on the site: hacking.

Every coding flaw on a website presents an opportunity for hackers...

Read Post

8 Scary Social Networking Sites Every Parent Should Know

(0) Comments | Posted October 30, 2013 | 3:56 PM

If you think you're hip to your children's online social habits because you know all about Facebook and Twitter, you've got it all wrong. Tweens and teens are increasingly leaving these sites in favor of new apps that offer richer features and a safe haven from watchful parents....

Read Post

Is Anything Safe Online?

(0) Comments | Posted September 16, 2013 | 3:11 PM

Recent revelations in the ongoing Edward Snowden scandal are shining a new light on the far-reaching cyber capabilities of the National Security Agency -- including the agency's ability to bypass the online encryption standards used by the majority of the web.

It's hard to overstate the significance...

Read Post

Why Your Medical Records Are No Longer Safe

(14) Comments | Posted January 17, 2013 | 2:59 PM

How many times have your medical records been illegally accessed?

It's a scary thought, but one that many of us will have to get used to unless big changes are made in the healthcare industry. While we tend to worry about web companies like Google, Facebook, and, more recently,...

Read Post

Be Careful When Discarding Old Smartphones and Electronics

(2) Comments | Posted December 26, 2012 | 10:30 AM

With the holiday season almost at an end, consumers all across the country will soon be reselling, donating or recycling their old smartphones, desktops, laptops and other electronics. But few people realize that gadgets often retain a significant amount of personal information -- even after you think you've deleted it.

Read Post

5 New Online Threats for Cyber Monday Shoppers

(4) Comments | Posted November 21, 2012 | 5:17 PM

Cyber Monday is just a few days away, but for those who plan on doing their holiday shopping online, there are several new threats you need to be aware of.

Identity theft and financial fraud usually increase between Black Friday and Christmas Eve -- as cyber thieves know there are...

Read Post

Is It Safe to Google "Kristen Stewart?" How Hackers Target Celebrity Gossip

(2) Comments | Posted August 10, 2012 | 2:07 PM

Whenever a celebrity scandal breaks, like Kristen Stewart's cheating on boyfriend Robert Pattinson, entertainment journalists aren't the only ones scrambling to get the story online -- so are hackers.

For the past 10 years, it's been a common tactic among hackers and online scammers to use celebrity news and other...

Read Post