Mike Foster's IT Security & Best Practices Blog

Latest Posts

What to Do if Someone Hacks Your Email Account

How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: Continue reading ‘What to Do if Someone Hacks Your Email Account’


How to Stop the Annoying Phone Calls

Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers.

Tools are available to help stop the problem. Continue reading ‘How to Stop the Annoying Phone Calls’


How to Best Protect Your Mobile Devices

The RSA Security Conference is wrapping up today. I’ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? Continue reading ‘How to Best Protect Your Mobile Devices’


Tesla Will Give a Car to a Hacker if they can Break In

Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays…

$250,000 if they can hack the autopilot
$100,000 if they can hack the modem or tuner
$100,000 if they can hack the key fob or phone-as-a-key

Microsoft, VMWare, and other companies are offering big prizes to someone for breaking their security.

Challenges like this are an excellent way for companies to find security holes in their hardware, software, and services. Most companies offer a bounty system to pay successful attackers every day of the year.

If you want to go, or even compete, the event is March 20-22 in Vancouver. Visit CanSecWest.com.


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords
Continue reading ‘773 Million Passwords Exposed – Were You Exposed?’


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. Continue reading ‘Attackers are Targeting High Net Worth Individuals’


Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Continue reading ‘Happy Computer Security Day!’


You Might Stop Receiving Essential Email Messages, and What to Do About It

If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Continue reading ‘You Might Stop Receiving Essential Email Messages, and What to Do About It’


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too. Continue reading ‘Stealing Tesla Cars, and Stealing Your Network with Agent Tesla’


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.
Continue reading ‘Can you Trust the Kindness of Tech Support Strangers?’