Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s Lynda.com with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections. For consultations requests, please contact Jeremiah.

Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward

Apple is opening its once-private bug bounty program to all researchers, as well as boosting vulnerability payouts and expanding the product scope to include MacOS. LAS VEGAS – Apple is giving its bug bounty program a much-needed makeover. The device manufacturer in a Thursday Black Hat USA 2019 session said it will open the historically […]

How to Transfer Saved Password from Google Chrome to Safari

Like most other popular browsers Google Chrome stores saved passwords. This is one of the most useful features that a web browser can have for a variety of reasons like automatically signing you into your favorite websites or allowing you to transfer your passwords into other browsers without much fuss. There are a lot of […]

3 Best Plugins to Send Emails From Your WordPress Site

Emails are the preferred method of transferring information online, and it makes sense that email would also be an essential part of running and managing a successful WordPress site. SMTP, or Simple Mail Transfer Protocol, is a simple communication protocol that allows the transfer of email over the internet. In addition to making your website’s […]

14 Best WordPress Security Plugins to Lock out the Bad Guys

Before we dive into some WordPress security plugins, let’s start with an example. Say you buy a new house. This exciting new investment requires a hefty down-payment you’re probably not used to spending. And, of course, you’re hit with inspection fees prior to buying. Then comes the mortgage and insurance payments, all of which come […]

6 of the Best Free Contact Form Plugins for WordPress

Web forms are essential for common data collection tasks, such as collecting email addresses, visitor information, feedback, surveys and member registrations. Even the humble contact form is usually found on most websites. Searching for the term “contact form” on the WordPress Plugin Directory yields thousands of results! To help navigate the volume of options and […]

Louisiana Gov Declares Emergency After Cyberattacks Plague Schools

Attacks on at least three school districts and likely others have prompted the state’s first emergency due to cyberattack. After a rash of public schools were hit with ransomware, Louisiana’s governor has declared a statewide state of emergency. School districts in the northern part of the state – including Monroe City, Morehouse Parish and Sabine […]

‘WannaCry Hero’ Avoids Jail Time in Kronos Malware Charges

Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware. Marcus Hutchins, the researcher hailed for squashing the WannaCry ransomware outbreak in May 2017, has been spared jail time over the creation of the infamous Kronos banking malware. The 25-year-old British researcher […]

Apple iMessage Flaw Allows Remote Attackers to Read iPhone Messages

Remote exploitation can be achieved with no user interaction. Five bugs in Apple’s iMessage service for the iPhone have been uncovered that require no user interaction to exploit, including one that would allow remote attackers to access content stored on iOS devices. First discovered by Google Project Zero security researcher Natalie Silvanovich, Apple has fully […]

Unique Monokle Android Spyware Self-Signs Certificates

Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election. A never-before-publicized mobile spy tool, a mobile surveillanceware remote access trojan (RAT) for Android called Monokle, has been spotted using novel techniques to exfiltrate data. According to the Lookout researchers who discovered […]

Protecting Against Ransomware Attacks: A Checklist

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves. Sometimes all it takes is a malicious email to infect an entire municipality with ransomware, freezing important city systems from water utilities or websites. That was the case with the […]