Pokemon Go is just the latest example in a growing list of smartphone security breaches. It has been reported that some users may have inadvertently compromised their phone when they downloaded the application by giving hackers access to their gmail accounts. In addition to the compromised gmail accounts, there are instances of hackers being able […]
About Don Lander
Joining the firm in 2014, Don is a Project Manager. Prior to joining the firm, Don was an IT Implement manager for a number of major financial services corporations in the Boston and Providence area for the past 25 years.
advice cell phone CEO CYBER CYBERAWARE cyber intel cyber security data breach disaster recovery DR employee encryption fines fraud fs-isac hack hackers hacking hipaa Information Security infosec intel IT AUDIT ITGC IT Security jobs laptop encryption MA 201 CMR 17 NICK DELENA NPPI OCD TECH password pastebin PII scam security SOUTH SHORE IT AUDIT threat intel Threat Intelligence video vulnerability assessment wep wifi working wpa
- Here are the top 5 observations we encounter while doing our vulnerability assessments! #vulnerabilityassessments… http://t.co/29n2YPuRe0 4 days ago
- We're here at @SecurityBSides @BsidesBoston discussing #OSINT and Pastebin scraping "for fun and for profit" http://t.co/rrLxeUTAZE 2 weeks ago
- Join us on Saturday, April 15th at BSides Boston for "Web Scraping for Fun and Profit"! #vulnerabilitytesting #penetrationtesting 2 weeks ago
- The cybersecurity landscape is constantly changing. Be sure your company is staying up to date protecting your data… http://t.co/SSGuU26uMc 2 weeks ago