Ondrej Krehel is a digital forensics and information security expert.
The 2012 political races were dominated by a debate about the “makers” vs. the “takers” among the American electorate. But it was government agencies themselves that were taken—by hackers, security flaws and employee ineptitude. Government agencies, from small county election boards to NASA, suffered data breaches. In fact, our federal and state governments have lost... Read More
My phone rings whenever a client is hacked, suffers a data breach, or is a victim of identity theft via digital means. My job as chief information security officer is to look at all the digital evidence. When possible, I reconstruct the cyber attack. It’s C.S.I. work. By reconstructing the attack, often I can tell... Read More
It’s another manic Monday, and you’re racing to drop off the kids, fight traffic, and get to work in time—to watch the Olympics. Americans are putting in time at the office—not to do actual work, but to watch Misty May-Treanor and Kerri Walsh Jennings go for gold in beach volleyball. Or the hot, post-Hunger Games... Read More
By Ondrej Krehel By now you’ve all seen the video of American gymnast Aly Raisman’s parents wincing, twisting and turning in their seats as they watched their daughter compete for Team USA in the Olympics gymnastics competition. (If you’ve been off the grid, check it out here.) We know how they feel, because when we see... Read More
How do most corporate data breaches happen? Lost laptops and USB drives. Now many businesses have some kind of security practice in place for lost corporate computers, whether it’s encrypted drives with remote wipe, or a call lost-and-reporting procedure. But how many have USB drive best practices on the books? Not many. Yet USBs, because... Read More
As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it. A screen lock is no longer enough. Dream Droid, a botnet-type of malware program, recently infected... Read More
There’s been a lot of commentary and gotcha-style journalism surrounding the Sony data breach, but not much constructive criticism. Yes, the breach could have easily been prevented. Had Sony enabled fairly standard firewall technology and kept its systems up-to-date with the latest patches, none of this most likely would have happened. Since most of us... Read More
Are you being tracked online? The answer is yes. There are financial incentives for everyone from malicious hackers, to scheming governments, to an industry that has found a way to monetize your digital habits. Behavioral marketing—delivering ads to consumers based on their activity online—is an estimated $80 billion industry. The goal is to sell: cars,... Read More
Some consumers are getting inundated with email warnings that their personal information may have been compromised in the Epsilon data breach.
Technology outpaces the law every day. New features are being adopted much faster than law enforcement and the court systems can keep up. This is a given at the high-speed crossroads of hi-tech and capitalism. Last fall, the federal courts covered some of the escaping ground as it relates to GPS tracking. An October editorial... Read More
Certain credit cards and other financial products mentioned in this and other articles on Credit.com News & Advice may also be offered through Credit.com product pages, and Credit.com will be compensated if our users apply for and ultimately sign up for any of these cards or products. However, this relationship does not result in any preferential editorial treatment.