From Internet Godfather to Leading Security Expert, Brett Johnson @GOllumfun: How Do Criminals Think?

  Advertisements

Bob Carver @cybersecboardrm: Security spending up, but adoption of cutting-edge tools is slow

Security spending up, but adoption of cutting-edge tools is slow https://t.co/O9gCEkGINe #securityspending @insiderpro #CyberSecurity #infosec —…

Bob Carver @cybersecboardrm: EU cybersecurity report says members can ban firms from 5G networks but declines to name China or Huawei

EU cybersecurity report says members can ban firms from 5G networks but declines to name China…

Bob Carver @cybersecboardrm: Iranian hackers targeted a US presidential campaign, Microsoft says – SFGate #Iran #cyberattacks #elections

Iranian hackers targeted a US presidential campaign, Microsoft says – SFGate #Iran #cyberattacks #elections #presidential #campaign…

Bob Carver @cybersecboardrm: APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence https://t.co/YnBWliAspW #CyberSecurity #infosec — Bob…

Bob Carver @cybersecboardrm: Actively exploited zero-day vulnerability found in Google Pixel, Huawei, Xiaomi, Samsung, and other devices #android #google #pixel #huawei

Actively exploited zero-day vulnerability found in Google Pixel, Huawei, Xiaomi, Samsung, and other devices #android #google…

Bob Carver @cybersecboardrm: Microsoft: Iranian Hackers Targeted 2020 Presidential Campaign #elections2020

Microsoft: Iranian Hackers Targeted 2020 Presidential Campaign #elections2020 #hackers #Iran #CyberSecurity #infosec https://t.co/eBwX5ihx0t — Bob Carver…

Bob Carver @cybersecboardrm: Signal fixes FaceTime-like eavesdropping bug

Signal fixes FaceTime-like eavesdropping bug | ZDNet #signal #encryption #smartphone #app #android #update #CyberSecurity ⁦@ZDNet⁩ https://t.co/ipR0tdo67B…

Bob Carver: My Picks For The Top Cybersecurity Companies Of 2019

My Picks For The Top Cybersecurity Companies Of 2019 https://t.co/snea4sBBoA #CyberSecurity #companies #2019 @forbes #CyberSecurity #infosec…

Bob Carver @cybersecboardrm: Ransomware incident to cost Danish company a whopping $95 million

Ransomware incident to cost Danish company a whopping $95 million | ZDNet https://t.co/pciA2uu2BQ #ransomware #Denmark #CyberSecurity…

Bob Carver @cybersecboardrm: Biometric machines in Afghan vote improve after last year’s glitches

Biometric machines in Afghan vote improve after last year's glitches – Reuters https://t.co/pxLFrBcInL #Afghanistan #biometrics #elections…

Bob Carver @cybersecboardrm: Chrome extensions are filled with malware. Here’s how to stay safe | WIRED UK

Chrome extensions are filled with malware. Here's how to stay safe | WIRED UK https://t.co/I0t3eJkcSi #chrome…

Bob Carver @cybersecboardrm: Microsoft:New Nodersok malware has infected thousands of PCs

Microsoft:New Nodersok malware has infected thousands of PCs | ZDNet https://t.co/r4TNprjLVX #microsoft #windows #malware #Nodersok #CyberSecurity…

Bob Carver @cybersecboardrm: Balancing Act by Event Planners to be Both Secure and Welcoming Gets Harder Skift

Balancing Act by Event Planners to be Both Secure and Welcoming Gets Harder Skift https://t.co/EaQWSswZP1 #conferences…

Some amazing insights into how #cybercriminals collaborate. The Original Internet Godfather, @GOllumfun , at #FraudForce19. #fraud #fraudprevention

Some amazing insights into how #cybercriminals collaborate. The Original Internet Godfather, @GOllumfun, at #FraudForce19. #fraud #fraudprevention…

Brett Johnson @GOllumfun: Shark Week! When Keynote Presenters Attack: An Open Letter to The Person Questioning my Reformation

Shark Week! When Keynote Presenters Attack: An Open Letter to The Person Questioning my Reformationhttps://t.co/mJNbPBMWmx —…

Brett Johnson @GOllumfun: When criminals think they are victims.Updated Story with a response from Mary Breen.

When criminals think they are victims. Updated Story with a response from Mary Breen.https://t.co/HDKrJmzkCi — Brett…

Bob Carver @cybersecboardrm: Bought A Car Recently? 198M Car Buyer Records Exposed In Massive Data Leak #data #leak #PII #carbuyers

Bought A Car Recently? 198M Car Buyer Records Exposed In Massive Data Leak #data #leak #PII…

Bob Carver @cybersecboardrm: What Is the CCPA? California’s Data Privacy Law Could Upend U.S. Businesses

What Is the CCPA? California's Data Privacy Law Could Upend U.S. Businesses | Fortune https://t.co/hkX3lsWkEm #California…

Bob Carver @cybersecboardrm: Destructive Malware Attacks Up 200% in 2019

Destructive Malware Attacks Up 200% in 2019 https://t.co/af0eFW9s5Q #malware #datadestruction @DarkReading #CyberSecurity #infosec pic.twitter.com/ng3p7xUrd3 — Bob…

Bob Carver @cybersecboardrm: Ransomware Used in Multimillion-Dollar Attacks Gets More Automated

Ransomware Used in Multimillion-Dollar Attacks Gets More Automated https://t.co/jCSPYoetEF #ransomware #automated @DarkReading #CyberSecurity #infosec — Bob…

Brett Johnson @GOllumfun: Where did modern Cybercrime begin? The AnglerPhish Podcast is Live. Now available on all major podcast outlets

Where did modern Cybercrime begin?The AnglerPhish Podcast is Live. Now available on all major podcast outlets…

Bob Carver @cybersecboardrm: Snyk grabs $70M more to detect security vulnerabilities in open-source code and containers

Snyk grabs $70M more to detect security vulnerabilities in open-source code and containers | TechCrunch https://t.co/28qv545yGI…

Bob Carver @cybersecboardrm: Google collects face data now. Here’s what it means and how to opt out

Google collects face data now. Here's what it means and how to opt out – CNET…

Bob Carver @cybersecboardrm: Testing threat intelligence data for DNS protection

Testing threat intelligence data for DNS protection | ESET https://t.co/pqwVJ4IWP6 #CyberSecurity #DNS #ThreatIntelligence #infosec @ESET #CyberSecurity…

Bob Carver @cybersecboardrm: The Latest Sample Analysis of OceanLotus APT Attacks Against China

The Latest Sample Analysis of OceanLotus APT Attacks Against China – Antiy Labs | The Next…

Bob Carver @cybersecboardrm: Facebook Met With U.S. Intelligence to Discuss 2020 Election Security

Facebook Met With U.S. Intelligence to Discuss 2020 Election Security | Fortune https://t.co/OfUCKgEoUe #facebook #google #microsoft…

Bob Carver @cybersecboardrm: A Scammer Reportedly Used a Deepfake to Steal $243,000

A Scammer Reportedly Used a Deepfake to Steal $243,000 https://t.co/99AHAYOVpE #deepfakes #scam #fraud #CyberSecurity @futurism #CyberSecurity…

Bob Carver @cybersecboardrm: 7 Types of Experiences Every Security Pro Should Have

7 Types of Experiences Every Security Pro Should Havehttps://t.co/XWMYfmVOGr #CyberSecurity #infosec #experience #careers #hacked #breach #blueteam…

Bob Carver @cybersecboardrm: Twitter CEO Dorsey’s Account Hacked, Sends Racist Tweets – Bloomberg #twitter #JackDorsey #hacked #CyberSecurity

Twitter CEO Dorsey’s Account Hacked, Sends Racist Tweets – Bloomberg #twitter #JackDorsey #hacked #CyberSecurity https://t.co/FKKjfZS6YN —…

Bob Carver @cybersecboardrm: Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched

Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched – TechRepublic https://t.co/pqFhB3w1VI #vulnerabilities #CyberSecurity #infosec…

Bob Carver @cybersecboardrm: False flag hacktivism on the rise as real activists turn away from hacking

False flag hacktivism on the rise as real activists turn away from hacking https://t.co/gYQRBHVcbT #hacktivism #falseflag…

Bob Carver @cybersecboardrm: 40% of enterprises experienced Office 365 credential theft

40% of enterprises experienced Office 365 credential theft, report finds https://t.co/yGJ4CsIYO6 #CyberSecurity #office365 @techrepublic #CyberSecurity #infosec…

Bob Carver @cybersecboardrm: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth https://t.co/OCJZi0ntBC #CyberSecurity #infosec —…

Bob Carver @cybersecboardrm: Google Analyzes Pilfered Password Reuse

Google Analyzes Pilfered Password Reuse https://t.co/OyDgD4sO88 #CyberSecurity #infosec — Bob Carver (@cybersecboardrm) August 20, 2019 Source:…

Bob Carver @cybersecboardrm: The 5 most important ways to stop cybercrime

The 5 most important ways to stop cybercrime https://t.co/aOXSkrg8R5 #cybercrime #CyberSecurity #infosec @fastcompany #CyberSecurity #infosec pic.twitter.com/GJR9gUno5C…

Apple: break Safari’s anti-tracking rules and we’ll treat you like malware

Apple: break Safari's anti-tracking rules and we'll treat you like malware – CNET https://t.co/JnNzTGRk85 #apple #safari…

Bob Carver @cybersecboardrm: 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network https://t.co/B0h50Y3OFN #ZeroTrust #CyberSecurity #riskmanagement pic.twitter.com/Hbfyb2wlcE…

Bob Carver @cybersecboardrm: So you can’t find enough cyber-security experts to join the team

So you can't find enough cyber-security experts to join the team. Time to dial a managed…

Bob Carver @cybersecboardrm: At Def Con, hackers and lawmakers came together to tackle holes in election security

At Def Con, hackers and lawmakers came together to tackle holes in election security – The…

Bob Carver @cybersecboardrm: Hackers Could Decrypt Your GSM Phone Calls

Hackers Could Decrypt Your GSM Phone Calls https://t.co/y0sG6gOrA6 #mobile #GSM #surveillance #CyberSecurity #infosec #CyberSecurity #infosec —…

Bob Carver @cybersecboardrm: Malware in PyPI Code Shows Supply Chain Risks

Malware in PyPI Code Shows Supply Chain Risks https://t.co/xxG9iJLZXH #CyberSecurity #infosec — Bob Carver (@cybersecboardrm) August…

Bob Carver @cybersecboardrm: Teen Tells DEF CON How He Hacked Millions of Student Records From Popular Education

Teen Tells DEF CON How He Hacked Millions of Student Records From Popular Education Software [Update]…

Bob Carver @cybersecboardrm: These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer – VICE https://t.co/OJyN58owJo #apple #iOS #iPhone #iPad…

Bob Carver @cybersecboardrm: How to manage Microsoft’s BitLocker encryption feature

How to manage Microsoft's BitLocker encryption feature https://t.co/nmWGmnuksn #CyberSecurity #infosec — Bob Carver (@cybersecboardrm) August 8,…

Bob Carver @cybersecboardrm: How MIT’s Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure https://t.co/2OHPZUEs4I #CyberSecurity #infosec — Bob Carver…

Bob Carver @cybersecboardrm: Microsoft launches Azure Security Lab, doubles top bug bounty to $40,000

Microsoft launches Azure Security Lab, doubles top bug bounty to $40,000 | VentureBeat https://t.co/qvwNf7hWqh #microsoft #clound…

Bob Carver @cybersecboardrm: How to Keep Hackers Out of Your Facebook and Twitter Accounts

How to Keep Hackers Out of Your Facebook and Twitter Accounts https://t.co/TrrZUGdfB5 @wired #twitter #facebook #hackers…

Bob Carver @cybersecboardrm: What is a computer virus? How they spread and 5 signs you’ve been infected

What is a computer virus? How they spread and 5 signs you've been infected https://t.co/1D43UcVyOq #CyberSecurity…

Bob Carver @cybersecboardrm: 4 Questions CISOs Need to Ask About Enterprise Cybersecurity

4 Questions CISOs Need to Ask About Enterprise Cybersecurity https://t.co/dR0MzNJATE #CyberSecurity #CISO #questions #CyberSecurity #infosec pic.twitter.com/5rLJDQUS59…

Bob Carver @cybersecboardrm: Quantum computing and cybersecurity:Preparing for a devastating impact

Quantum computing and cybersecurity:Preparing for a devastating impact https://t.co/SnCgXXUiaJ #CyberSecurit #quantumcomputing #encryption #CyberSecurity #infosec pic.twitter.com/nHT2URlteW —…