Home

Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s Lynda.com with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections. For consultations requests, please contact Jeremiah.

New Trend: Social media marketing using paid trolls

New trend in Social media marketing: paid trolls to create controversy & drive traffic. With a paid troll, companies &…

How to make Siri activate when you say ‘Hey Siri’ to your Mac with macOS Sierra

Or you can make Siri appear when you say something like, ‘Chitty chitty bang bang.’ On iOS, you can activate Siri by saying “Hey Siri.” Vocal activation isn’t available on macOS Sierra through the Siri system preferences, but as Jdcampbell on Reddit points out, it can be done through Sierra’s Accessibility system preference. Essentially, you […]

Tap ‘n Ghost Attack Creatively Targets Android Devices

Researchers use malicious NFC tags and booby-trapped physical surfaces to connect Android devices to malicious wireless networks. Researchers have created a novel proof-of-concept (PoC) attack named Tap ‘n Ghost, which targets Near Field Communication (NFC)-enabled Android smartphones. This allows an attacker to take control of a target phone simply by tricking the victim into placing […]

Hacked Hair Straighteners Can Threaten Homes

A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation. Researchers have found a way to successfully hack connected hair straighteners to turn them on and increase the heating element up to its maximum temperature—causing a serious fire hazard for unsuspecting owners. Pen Test Partners decided […]

1,300 Popular Android Apps Access Data Without Proper Permissions

Study finds Android apps circumvented privacy opt-in rules and collected sensitive user information against user permission. Over 1,300 popular Android apps defy user permissions and gather sensitive data with no consent, according to a study by a coalition of academics from the International Computer Science Institute. The report examined popular mobile apps available through the […]

Why Cities Are a Low-Hanging Fruit For Ransomware

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack. Ransomware attacks against local governments and cities are repeatedly making headlines, with crippling results on city operations and budgets. Last month, the Florida city of […]

Researcher Bypasses Instagram 2FA to Hack Any Account

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process. A researcher earned a $30,000 bug bounty from Facebook after discovering a weakness in the Instagram mobile recovery process that would allow account takeover for any user, via mass brute-force campaigns. Independent researcher Laxman Muthiyah took a look […]

Heather Mills Gets An Apology and ‘Substantial’ Settlement in Spyware Case

Rupert Murdoch’s News Group has agreed to pay damages to Paul McCartney’s ex as part of the massive phone-hacking scandal by UK tabloids. The 2010-2011 News of the World phone hacking scandal – in which it was revealed that the tabloid dropped malware on celebrity targets’ phones in order to gather dirt for news stories […]

Unusual Linux Ransomware Targets NAS Servers

QNAPCrypt continues to spread via brute-force attacks. A rare instance of ransomware targeting Linux-based file storage systems (network-attached storage servers, specifically) has been spotted, spreading via 15 separate but related campaigns. The adversaries behind the effort are continuing their depredations on an ongoing basis, according to researchers, so targets are expected to proliferate. Researchers at […]

How to use a mouse with an iPad

The iPad can support a mouse, I find this really handy for browsing the web and Microsoft office.