Cyber Security and Wireless Tech Expert and Author Scott Schober delivers the latest cybersecurity news, tips, reviews and interviews with industry experts.
This week, Robert Fleming offers an expert perspective.By Scott Schober
This week, Emilio Iasiello offers an expert perspective.By Scott Schober
This week, John Hoda offers an expert perspective.By Scott Schober
This week, Bob Carver tells us what keeps him up at nightBy Scott Schober
This week, Tyler Cohen Wood offers her unique perspective.By Scott Schober
Scott discusses Bitcoin, Litecoin, Ethereum, Monero and their pros and cons.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
The Future of Passwords (audio interview)
24:37
24:37
Play later
Play later
Lists
Like
Liked
24:37
Cybersecurity expert, Scott Schober discusses the past, present and future of password security with Izak Bovee, Director of Product Management at Accellion. This podcast is audio only.By Scott Schober
How are military personnel being tracked all over the world? Strava fitness platform allows anyone to publicly display their workout routines and running paths which is causing great concern for the U.S. Pentagon.By Scott Schober
Scott reviews Swiped and how to protect yourself in a world full of scammers, phishers and identity thieves. Swiped was written by Adam Levin.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Can you fight hidden keyloggers? Watch this product review
3:29
3:29
Play later
Play later
Lists
Like
Liked
3:29
Scott reviews MobileTrust and GuardedID by Strikeforce. These keystroke encryption software solutions are available on iOS and Android as well as Mac and PC. But how do they stack up against keyloggers?By Scott Schober
Why is Uber is the Equifax of Ridesharing? Not only was Uber hacked but they have replaced Equifax as the most hated company because they paid off hackers and tried to conceal it from everyone. This hack involved some 57 million customer and driver accounBy Scott Schober
Over 2 billion robocalls are placed every month. Receiving an occasional robocall call would be no big deal but SPAM wouldn’t be SPAM if it was only occasional. I personally receive 5 to 6 robocalls every day and I am not alone as the number one consumerBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
Bluetooth Card Skimmers In Pumps - Tips To Stay Safe
4:25
4:25
Play later
Play later
Lists
Like
Liked
4:25
Bluetooth Card Skimmers In Pumps - Tips To Stay SafeBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
OneLogin Breach Even Scarier Than LastPass Hack
2:48
2:48
Play later
Play later
Lists
Like
Liked
2:48
Do you use pass word managers? Scott details OneLogin breach and compares it to LastPass.Podcast EpisodeBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
Simple Device To Remember Passwords - PasswordsFast Product Review
4:26
4:26
Play later
Play later
Lists
Like
Liked
4:26
Podcast Scott reviews PasswordsFast, a simple device that helps regular users manage many passwords.By Scott Schober
Scott explains why Root9b has topped the cybersecurity 500 for the 5th consecutive quarter.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Bruce Schneier's Data and Goliath Book Review
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27
Scott reviews fellow cybersecurity expert Bruce Schneier's book on big data entitled Data and Goliath. What does he think about it?By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Cybercrime to cost $6 trillion annually by 2021 reveals Cybersecurity Ventures 2017 Report
2:42
2:42
Play later
Play later
Lists
Like
Liked
2:42
Cybersecurity Ventures predicts global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021...By Scott Schober
Podcast EpisScott goes into some details on the massive IoT botnet attack on the Internet and why that was just the beginning. He also provides some basic cybersecurity tips for all of our IoT devices.odeBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
Facebook Admits To Buying Stolen Passwords On Dark Web
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53
Scott discusses Facebook's practice of buying stolen passwords from hackers on the Dark Web. How does that help keep Facebook users safe?By Scott Schober
Scott discusses the rise in malware bug bounties and their asscoiated costs to companies like United Airlines, Google and Apple.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Does 'Future Crimes' by Marc Goodman live up to its name? Watch this book review
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19
Scott reviews Future Crimes by Marc Goodman. Find out how many stars he gives it.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Which Paper Shredders Are Best For Cybersecurity?
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29
Scott discusses various paper shredding (strip, cross, micro) methods and why they are an important part of your cybersecurity best practices.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
What is the Most Secure Messaging App? Squealock App Review
2:59
2:59
Play later
Play later
Lists
Like
Liked
2:59
Scott discusses the security features of Squealock, a new messaging app for iOS and Andorid, and compares it to other competing messaging apps such as Dust and WhatsApp.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Yahacked! Are you safe from the biggest hack in history?
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27
Scott discusses the huge Yahoo hack affecting 500 million accounts and tips for Yahoo users and anyone else to stay safe on the internet.By Scott Schober
Scott discusses Pokemon Go privacy and safety issues in the wake of the biggest online game launch ever.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Google’s Big Encryption Gamble Revealed At Google I/O
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23
Scott discusses Google's default encryption (off) policies played out during their new product announcements at this year's Google I/O conference.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Ghost In Wires (by Kevin Mitnick) Book Review
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01
Scott reviews Kevin Mitnick's book entitled Ghost In The Wires.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Federal Ruling Against Stingray Surveillance Favors Privacy
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23
Scott details the controversial use of Stingrays and Dirtboxes by government agencies like the NSA and how a federal judge has put limits to appease privacy advocates.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Why Are So Many Prison Calls Being Recorded?
2:52
2:52
Play later
Play later
Lists
Like
Liked
2:52
Scott weighs the pros and cons of recording and storing prisoner phone calls. He also explains why they go to such great lengths to import contraband phones and use them in prisons.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Aegis Secure Key Review - Secure Enough For A Cybersecurity Expert?
3:31
3:31
Play later
Play later
Lists
Like
Liked
3:31
Scott reviews Aegis Secure Key 3 from Apricorn. This USB 3.0 stick includes a numeric keypad, built-in hardware encryption and up to 480GB of storage. Watch Scott's video review for all the details and final product rating.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Encryption Is Perfect But iPhone Security Is Not
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20
Cybersecurity Expert Scott Schober discusses more technical and security implications of Apple vs FBI regarding iCloud and backers of Apple's stance against the FBI.By Scott Schober
Cybersecurity Expert Scott Schober discusses the technical and security implications of Apple vs FBI.By Scott Schober
Scott examines how IoT (Internet of Things) and all future connected devices for our homes and lives pose a serious security risk to everyone.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Identity Theft: The Quicker You Act The Less Damage Is Done
3:40
3:40
Play later
Play later
Lists
Like
Liked
3:40
Scott outlines the best steps to secure and save your digital identity after it has been stolen.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19
Scott Schober, BVS CEO, Cybersecurity and Wireless Technology Expert and Author reveals examines the T-Mobile and Experian hacks and how you can protect your business.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Stagefright Bug Takes Center Stage On 950 Million Android Devices
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19
BVS CEO and Cyber Security and Wireless Tech Expert Scott Schober looks at the large security bug known as Stagefright affecting potential 950 million Android devices.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Can Our Cars Really Be Hacked? What You Need To Know
3:39
3:39
Play later
Play later
Lists
Like
Liked
3:39
Cyber Security and Wireless Tech Expert Scott Schober looks at the recent Jeep hacking through UConnect wireless entertainment system.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Why Non-Cheaters Should Be Just As Worried As Ashley Madison Members
3:39
3:39
Play later
Play later
Lists
Like
Liked
3:39
Cyber Security and Wireless Tech Expert Scott Schober dives deeper into the Ashley Madison hacking scandal to discuss the details and ramifications of the latest huge data leak from the hackers.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Back To School Security Tips with Cyber Security Expert Scott Schober
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38
Back To School Cyber Security Tips with Cyber Security Expert Scott Schober explains the need for strong passwords, secure firewalls and cell phone detection using PocketHound for schools, universities and testing facilities.By Scott Schober
Podcast EpisodScott Schober discusses recent hacking stories involving U.S. military drones and just how hackable they are in this 2 Minute Cyber Security Briefing video podcast episode.eBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
Are You One Of The 37 Million Exposed Ashley Madison Users?
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58
Cyber Security and Wireless Technology Expert, Scott Schober, discusses the Ashley Madison hack by The Impact Team and its implications for some 37 million users in this 2 Minute CyberSecurity Briefing.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
LastPass Hacked And Why I Have Never Used It
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34
Cyber Security and Wireless Technology Expert, Scott Schober, discusses the LastPass hack and what system he uses for passwords to stay safe from hackers in this 2 Minute CyberSecurity Briefing.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Is Biometric Security Hacker Proof? Special Interview With AllWeb ID Co- Founder
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58
Is Biometric Security Hacker Proof? Cyber Security expert Scott Schober interviews AllWeb Technologies Co- Founder Adnan Qadeer on their biometric solution and where the industry is heading.By Scott Schober
2
2 Minute CyberSecurity Briefing


1
Is "Skyjacking" The New Hijacking For Consumer Drones?
3:16
3:16
Play later
Play later
Lists
Like
Liked
3:16
Is "Skyjacking" The New Hijacking For Consumer Drones? Cybersecurity expert, Scott Schober examines the threats to both drone pilots and the public in this 2 Minute CyberSecurity Briefing.By Scott Schober
2
2 Minute CyberSecurity Briefing


Scott discusses the Billion dollar hack by multinational hackers as reported by Kaspersky LabsBy Scott Schober
Premera and Anthem insurance agencies are among the latest mega-breaches. Find out why these are the new targets for hackers.By Scott Schober
Teachers Have New Enemy In War On Cheating. Social media is being increasingly used and abused for the purposes of cheating.By Scott Schober
Scott Schober, speaks with John Grimes JD, Director of Intelligence Analytics & Assistant Professor Dept of Justice Sciences & Center for Information Assurance and Joint Forensics Research at the 2015 Connected World ConferenceBy Scott Schober
2
2 Minute CyberSecurity Briefing


1
Can Emergency Management Be Prepared For Cyber Attacks?
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17
BVS CEO and cyber security expert, Scott Schober, speaks with James Drylie, Ph.D., Executive Director, School of Criminal Justice & Public Administration, Kean University at the 2015 Connected WorldBy Scott Schober