Mike Foster's IT Security & Best Practices Blog

Latest Posts

Tesla Will Give a Car to a Hacker if they can Break In

Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays… $250,000 if they can hack the autopilot$100,000 if they can hack the modem or tuner$100,000 if they can hack the key fob or phone-as-a-key Microsoft, VMWare, and other companies are offering big prizes to someone […]

Continue reading Tesla Will Give a Car to a Hacker if they can Break In


Hacker Convention Starts Later This Week

Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.

Continue reading Hacker Convention Starts Later This Week


Attackers Can Hack Your Phone Without Having Your Phone

Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally,

Continue reading Attackers Can Hack Your Phone Without Having Your Phone


If Someone Impersonates You on Facebook

Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you…

Continue reading If Someone Impersonates You on Facebook


How To Know if a Password Attack Succeeded

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…

Continue reading How To Know if a Password Attack Succeeded


No Flash Attacks After June 30

Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.

Continue reading No Flash Attacks After June 30


This Hacker Tells All

CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this hacker’s point of view on attacking tens of thousands of companies…

Continue reading This Hacker Tells All


Hacking Easier than Protection

The shocking truth: In some ways, it is easier to hack systems than it is to protect them. There are many automated tools that greatly simplify the art of hacking

Continue reading Hacking Easier than Protection


Don’t Get Tricked

Those sites that say you can look to see if someone is on AshleyMadison.com, they are probably scams. Those sites that say they will update you to Windows 10, they are scams. That email from your boss that says to quietly transfer money, they are scams too. Avoid getting viruses, keep your computer from being […]

Continue reading Don’t Get Tricked


Hackers Can Kill You

Am at the famous DEF CON ® Hacking Conference. One of the presentations today is entitled, “I Will Kill You.” A skilled hacker will show how he can do so by creating a doctor’s medical document showing cause of death,

Continue reading Hackers Can Kill You