Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections from other authors to keep you on the edge of technology and security. For consultations requests, please contact Jeremiah.

Resetting the Logitech bluetooth keyboard

Resetting the Logitech bluetooth keyboard The Logitech K810 has been my favorite keyboard for many years. I have one at home and one in the office. It allows to easily switch between 3 different devices. It has the same size and layout as most notebooks, is stylish, and a blast to type. But one day […]

DuckDuckGo Tracker Radar Exposes Hidden Tracking

DuckDuckGo Tracker Radar is a best-in-class data set about trackers that is automatically generated and maintained through continuous crawling and analysis. This data set is now publicly available to use for research and for generating tracker block lists. And, the code behind it is now open source. We use it ourselves to power the tracker […]

Meaning Behind the Phrase to Cross the Rubicon

To cross the Rubicon is a metaphor which means to take an irrevocable step that commits one to a specific course. When Julius Caesar was about to cross the tiny Rubicon River in 49 B.C.E., he quoted from a play by Menander to say “anerriphtho kybos!” or “let the die be cast” in Greek. But […]

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers. NEW ORLEANS – Sophisticated nation-state groups are increasingly using mobile devices as an infection vector. Oded Vanunu, head of products vulnerability research at Check Point research, told Threatpost during CPX 360 this week […]

Sodinokibi Ransomware Group Sponsors Hacking Contest

Larger winnings for underground skills competitions are attracting sophisticated crime groups. White hats aren’t alone in holding hacking contests. Russian-language cybercriminals are known for running similar competitions on underground forums. However, an analysis of Dark Web activity has uncovered a trend towards offering increasingly high-stakes prizes during such battles. At the same time, increasingly sophisticated […]

Coronavirus Campaigns Spread Emotet, Malware

The ongoing global spread of the disease precipitates malware infections. As the coronavirus originating in the Wuhan province of China continues to stir widespread fears about a global public health crisis, some see an opportunity in the outbreak. A recent spate of malicious, botnet-driven emails is using the coronavirus as a theme, according to telemetry […]

How Try Chrome OS in VirtualBox Before Buying a Chromebook

Google’s Chromebooks run Chrome OS, a lightweight operating system based on Linux that provides you with a full Chrome browser and a basic desktop environment. Before buying a Chromebook, you may want to play with Chrome OS in a virtual machine in a window on your desktop. What You’re Getting RELATED: The Best Chromebooks You Can Buy, 2017 Edition […]

Critical WordPress Bug Leaves 320,000 Sites Open to Attack

Authentication bypass bugs in WordPress plugins InfiniteWP Client and WP Time Capsule leave hundreds of thousands of sites open to attack. Two WordPress plugins, InfiniteWP Client and WP Time Capsule, suffer from the same critical authorization bypass bug that allows adversaries to access a site’s backend with no password. All an attacker needs is the […]

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts. Mobile carriers have left the door wide open to SIM-swap attacks, particularly when it comes to prepaid accounts, researchers have found. SIM swapping is a form of fraud that allows crooks to […]