Doug Olenick SC Media

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

Risk and compliance challenges in the swift moving lead-generation market

Recently, Andrew Smith, Director of the FTC’s Bureau of Consumer Protection stated that one of its priorities would be to “combat bad practices in the lead generation market.” 33 Antitrust ABA 75, 76 (Spring 2019). Smith suggested the FTC was concerned about the entire ecosystem’s bad practices. He echoed his remarks during Comply 2019, an…

Google camera app flaw endangered millions of devices

A vulnerability in the Google Camera Application left millions of Google and Samsung smartphones open to being potentially abused potentially letting a malicious actor to take photos, download images and video and listen in to phone calls. The flaw, CVE-2019-2234, is a permission bypass issue that enables real-time access to a phone through the camera…

How to prepare for the U.S. Census to move online

History will be made on April 1, 2020. For the first time, the United States Census will offer a full internet response option, in addition to traditional paper responses. The digitization of the census is meant to address the challenges of counting an increasingly large and diverse population, while also complying with strict cost constraints…

police-and-computer

Data breach potentially endangers Fairfax, Va. police officers

About 1,800 people, including 500 Fairfax, Va., county police department employees, had their PII possibly exposed when a USB drive carrying the information went missing. The USB drive containing the full names, birth dates and Social Security numbers for the Fairfax police officers and other employees belonged to Police Chief Cynthia McAlister, who heads the…

Get ahead of the cybersecurity curve

Experienced cybersecurity leaders are beginning to call for a move from reactive detection to proactive prevention. It’s clear that the need to get ahead of the cybersecurity curve is real. Over the past decade, experts talked about the number of days that malware is in your system, and now the discussion is fast becoming how…

Design flaw leaves Bluetooth devices vulnerable

An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking. Zhiqiang Lin, associate professor of computer science and engineering at the university, found the commonly used Bluetooth Low Energy devices, such as fitness trackers and smart speakers,…

Using security orchestration to simplify IoT defense in depth

Even as the technology industry continues to scramble to protect personal computers, datacenters and other traditional IT systems from increasingly sophisticated cyberattacks, a new attack target has emerged – the Internet of Things (IoT). To protect their IoT applications from attack, organizations are working to adopt for the IoT the same cybersecurity strategy which has…

Next post in Executive Insight