top of page
TAPROOT SECURITY®
Cybersecurity Consulting
Search
Mike McCormick
Oct 15, 20193 min read
SIM Swap Insanity
SIM Swapping is in the news again, reminding us the US has let this madness continue while other countries took strong steps to stop it....
0 comments
Mike McCormick
Jul 21, 20193 min read
Is FaceApp a Russian Spyware Trojan?
FaceApp is enjoying another viral moment fueled by celebrity selfies, while sparking dire warnings from security and privacy experts. Now...
0 comments
Mike McCormick
Jun 25, 20192 min read
Time to Hang Up on Government Phone Snooping
Along with the rest of the USA Freedom Act, the Call Detail Records (CDR) program is set to expire on 12/15/2019. This is the infamous...
0 comments
Mike McCormick
Mar 26, 20192 min read
Facebook's Belly Flop
After a whistle blower leaked the news to journalist Brian Krebs, who announced it on his blog, Facebook officially admitted that it has...
0 comments
Mike McCormick
Feb 18, 20193 min read
Rebooting US Cybersecurity After the Shutdown
Smelling blood, American adversaries began circling like sharks during the 35-day partial government shutdown.
0 comments
Mike McCormick
Jan 8, 20193 min read
Random Security
NIST’s Random Bit Beacon is a Game Changer The US government just unveiled a machine that can generate truly random 1s and 0s. They plan...
0 comments
Mike McCormick
Nov 13, 20182 min read
Treasury Leaks Bank Secrets
A senior official in the Treasury Department’s financial crimes unit (FinCEN) was just arrested for leaking thousands of Suspicious...
0 comments
Mike McCormick
Oct 9, 20184 min read
Chinese Spy Chip Trumps Tariffs
Chinese cyber exploits are back in the news with a bombshell story claiming China planted tiny “spy chips” inside Made in China servers...
0 comments
Mike McCormick
Jul 30, 20183 min read
Facing Up To Bad Biometrics
The ACLU conducted a controversial experiment last week with Amazon’s popular face matching software Rekognition. They ran photos of...
0 comments
Mike McCormick
Jun 20, 20183 min read
Playing the Dark Game
Cyber security is played for high stakes in a world of shadowy threats. Although it’s seldom discussed openly, this dark game can take a...
0 comments
Mike McCormick
Apr 17, 20189 min read
Give Windows a Security Spring Cleaning: 2023 Edition
It’s time to give your Windows PC a security spring cleaning! I’m sure you’re doing all the basics, like updating Windows and running...
0 comments
Mike McCormick
Mar 20, 20184 min read
Did Facebook Break the Law?
You probably know Cambridge researchers got access to 50 million Facebook user profiles, then gave the data to a private political...
0 comments
Mike McCormick
Mar 7, 20183 min read
When Insiders Profit from Cyber Breaches
One outrageous thing we learned about the Equifax breach (among many) is that three corporate executives sold company stock after the...
0 comments
Mike McCormick
Dec 15, 20173 min read
After Net Neutrality: A Silver Lining?
Net Neutrality's demise may open the door to overdue cybersecurity improvements. Before you send me hate mail, let me reiterate my...
0 comments
Mike McCormick
Nov 24, 20173 min read
Who Names Cyber Hurricanes?
Hurricanes get names (Harvey, Irma, Jose, Maria…) assigned alphabetically by the National Oceanic and Atmospheric Service (NOAA). ...
0 comments
Mike McCormick
Nov 3, 20172 min read
Face to Face with Apple Face ID
Apple’s new iPhone X hit stores November 3rd. Its most talked about feature is Face ID. Instead of touching your finger to the phone to...
0 comments
Mike McCormick
Oct 3, 20173 min read
Cracks in Facebook's Walled Garden
Facebook sits at the eye of a perfect storm this week. Congress forced them to reveal the extent of Russian ads and fake news during the...
0 comments
Mike McCormick
Sep 20, 20172 min read
Shamir’s Singularity: The End of Security
“The battle is over. We lost.” This gloomy proclamation was made by a world-famous security expert at a professional association chapter...
0 comments
Mike McCormick
Sep 12, 20173 min read
Open Letter to Equifax
Dear Equifax, In the aftermath of the most serious consumer data theft in US history, steps you take to restore the trust of consumers,...
0 comments
Mike McCormick
Jul 26, 20174 min read
Thunder Sticks and Smartphones
Hackers don’t exploit our computers; they exploit our ignorance. Most of us lack even a basic idea of how our digital gadgets work. ...
0 comments
NEED TO KNOW BLOG
ntkblog.org
because you can handle the truth
bottom of page