Mike Foster's IT Security & Best Practices Blog

Latest Posts

Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


Hacker Convention Starts Later This Week

Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.

Continue reading Hacker Convention Starts Later This Week


Attackers Can Hack Your Phone Without Having Your Phone

Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally,

Continue reading Attackers Can Hack Your Phone Without Having Your Phone


Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks.

Continue reading Avoid These 3 Really Good Hacker Tricks


How To Know if a Password Attack Succeeded

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…

Continue reading How To Know if a Password Attack Succeeded


This Hacker Tells All

CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this hacker’s point of view on attacking tens of thousands of companies…

Continue reading This Hacker Tells All