iOS app Android app

Michael Gregg
GET UPDATES FROM Michael Gregg
 
Michael Gregg, CISSP, CISA, CISM, is an ‘ethical hacker’ who provides cybersecurity services to Fortune 500s and US government agencies. He’s published over a dozen books on IT security and is a well-known security trainer and speaker. Gregg is COO of Superior Solutions Inc. (www.thesolutionfirm.com), headquartered in Houston.

Entries by Michael Gregg

Cyber-Ransom and Online Extortion - 5 Ways You Could Fall Victim

(0) Comments | Posted July 2, 2014 | 11:43 AM

Imagine turning on your laptop one day, only to be greeted by a bright, red screen with a warning message: "Your personal files are encrypted! ... The private key will be destroyed in 72 hours."

What would you do?

Cyber-ransom is a relatively new crime on America's digital...

Read Post

Do You Have a Right to Privacy... From Google?

(2) Comments | Posted May 23, 2014 | 1:33 PM

Recent events, such as the U.S. House bill to restrict NSA data collection, Facebook's decision to make it easier for users to share less personal information and Europe's top court ruling that EU citizens have the "right to be forgotten" by online search engines like Google, highlight the question: What...

Read Post

Should We Blame Russia for the Target Breach?

(1) Comments | Posted February 14, 2014 | 2:48 PM

Is it time to hold the Russian government responsible for the rise in sophisticated cybercrime attacks on the U.S. economy?

As Congress recently held hearings on the Target data breach to discuss new ways to protect consumer information and prevent future data breaches, one key issue that should be on...

Read Post

5 Lessons from the Snapchat and Target Hacks

(1) Comments | Posted January 6, 2014 | 3:16 PM

The new year has only just begun and already four major brands -- Snapchat, Target, Skype (owned by Microsoft) and Yahoo! -- have fallen victim to hackers. They join a seemingly endless list of other businesses, from big (Google, Sony, Lockheed Martin, Visa, RSA, Barnes & Noble, T.J. Maxx, etc.)...

Read Post

5 Ways HealthCare.gov Could Get Hacked

(5) Comments | Posted November 22, 2013 | 5:12 PM

Glitches and outages have been the main focus thus far in the scrutiny over the HealthCare.gov website - but a bigger problem could be looming on the horizon for Americans who wish to enroll on the site: hacking.

Every coding flaw on a website presents an opportunity for hackers...

Read Post

8 Scary Social Networking Sites Every Parent Should Know

(0) Comments | Posted October 30, 2013 | 3:56 PM

If you think you're hip to your children's online social habits because you know all about Facebook and Twitter, you've got it all wrong. Tweens and teens are increasingly leaving these sites in favor of new apps that offer richer features and a safe haven from watchful parents....

Read Post

Is Anything Safe Online?

(0) Comments | Posted September 16, 2013 | 3:11 PM

Recent revelations in the ongoing Edward Snowden scandal are shining a new light on the far-reaching cyber capabilities of the National Security Agency -- including the agency's ability to bypass the online encryption standards used by the majority of the web.

It's hard to overstate the significance...

Read Post

Why Your Medical Records Are No Longer Safe

(14) Comments | Posted January 17, 2013 | 2:59 PM

How many times have your medical records been illegally accessed?

It's a scary thought, but one that many of us will have to get used to unless big changes are made in the healthcare industry. While we tend to worry about web companies like Google, Facebook, and, more recently,...

Read Post

Be Careful When Discarding Old Smartphones and Electronics

(2) Comments | Posted December 26, 2012 | 10:30 AM

With the holiday season almost at an end, consumers all across the country will soon be reselling, donating or recycling their old smartphones, desktops, laptops and other electronics. But few people realize that gadgets often retain a significant amount of personal information -- even after you think you've deleted it.

...
Read Post

5 New Online Threats for Cyber Monday Shoppers

(4) Comments | Posted November 21, 2012 | 5:17 PM

Cyber Monday is just a few days away, but for those who plan on doing their holiday shopping online, there are several new threats you need to be aware of.

Identity theft and financial fraud usually increase between Black Friday and Christmas Eve -- as cyber thieves know there are...

Read Post

Is It Safe to Google "Kristen Stewart?" How Hackers Target Celebrity Gossip

(2) Comments | Posted August 10, 2012 | 2:07 PM

Whenever a celebrity scandal breaks, like Kristen Stewart's cheating on boyfriend Robert Pattinson, entertainment journalists aren't the only ones scrambling to get the story online -- so are hackers.

For the past 10 years, it's been a common tactic among hackers and online scammers to use celebrity news and other...

Read Post

How to Speak 'Hacker'

(2) Comments | Posted July 23, 2012 | 5:37 PM

Next week is Black Hat -- perhaps the world's most significant and influential annual hacking conference. It's an event that draws in the best and brightest (and sometimes, the borderline legal) hackers from around the world to show off the latest threats to our phones, laptops, PCs, Macs,...

Read Post

How Are Celebrity Cellphones Hacked?

(13) Comments | Posted March 16, 2012 | 1:22 PM

Celebrities are a perfect target for hackers -- they're highly visible, spend lots of time on their smartphones and they know next to nothing about security. It's no wonder they're often victimized by hackers -- from lone hackerazzis like the alleged Christopher Chaney to hacker groups like the...

Read Post