Home

Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s Lynda.com with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections. For consultations requests, please contact Jeremiah.

Protecting Against Ransomware Attacks: A Checklist

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves. Sometimes all it takes is a malicious email to infect an entire municipality with ransomware, freezing important city systems from water utilities or websites. That was the case with the […]

How to remove the date, author, comment, update date, tags and categories from wordpress

Many of our wordpress theme users asked how to remove the date, author and comment links below the post title, or the update date, tags and categories from the post footer. Some of the following css codes may work for many wordpress themes, but they are rather specific to our wordpress themes. Insert the css […]

Iran-Linked APT34 Invites Victims to LinkedIn for Fresh Malware Infections

The group was posing as a researcher from Cambridge, and was found to have added three new malware families to its spy arsenal. A recent phishing campaign by Iran-linked threat actor APT34 made use of a savvy approach: Asking victims to join their social network. According to FireEye, the adversaries masqueraded as a Cambridge University […]

WordPress Plugin Flaws Exploited in Ongoing Malvertising Campaign

An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages. A widespread and ongoing malicious advertising campaign is exploiting several recently-disclosed WordPress plugin vulnerabilities to redirect website visitors to booby-trapped landing pages. Researchers at Wordfence said that they recently discovered bad actors injecting code into websites with the vulnerable plugins […]

Large-Scale Government Hacks Hit Russia, Bulgaria

The Bulgarian attack impacted almost all tax information for the entire country. A pair of notable hacks on government targets have come to light: One, an attack affecting nearly the entire country of Bulgaria; and two, a hack of Russia’s main security agency (FSB) that represents the largest data heist ever experienced there. In Bulgaria, […]

Amazon Alexa, Google Home On Collision Course With Regulation

Threatpost talks to Tim Mackey with Synopsys about recent Amazon Echo and Google Home privacy faux pas. Will GDPR and other regulations catch up to the voice assistants? Voice assistants are growing rapidly in popularity — but at the same time, the privacy concerns and security issues with popular home assistant devices like Amazon Echo […]

New Trend: Social media marketing using paid trolls

New trend in Social media marketing: paid trolls to create controversy & drive traffic. With a paid troll, companies &…

How to make Siri activate when you say ‘Hey Siri’ to your Mac with macOS Sierra

Or you can make Siri appear when you say something like, ‘Chitty chitty bang bang.’ On iOS, you can activate Siri by saying “Hey Siri.” Vocal activation isn’t available on macOS Sierra through the Siri system preferences, but as Jdcampbell on Reddit points out, it can be done through Sierra’s Accessibility system preference. Essentially, you […]

Tap ‘n Ghost Attack Creatively Targets Android Devices

Researchers use malicious NFC tags and booby-trapped physical surfaces to connect Android devices to malicious wireless networks. Researchers have created a novel proof-of-concept (PoC) attack named Tap ‘n Ghost, which targets Near Field Communication (NFC)-enabled Android smartphones. This allows an attacker to take control of a target phone simply by tricking the victim into placing […]

Hacked Hair Straighteners Can Threaten Homes

A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation. Researchers have found a way to successfully hack connected hair straighteners to turn them on and increase the heating element up to its maximum temperature—causing a serious fire hazard for unsuspecting owners. Pen Test Partners decided […]