David D. Geer #geercom
@geercom
Followers
29K
Following
632
Media
1K
Statuses
17K
B2B cybersecurity writer & journalist. You want a voice with decision-makers, and I speak cyber.(c)™ Operating since 2000.
Greater Cleveland area
Joined October 2008
When cybercriminals find a security hole no one knows about, they keep it to themselves until they are ready to exploit it. Learn "The Dangers of Zero-Day Exploits," the products at risk, and how companies respond at https://t.co/JKJ98DJJwy .
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
0
1
Check out my latest article: Building an Evergreen Cybersecurity Content Strategy https://t.co/UTspxAIETY via @LinkedIn
linkedin.com
By David D. Geer https://www.
0
0
1
Are you tired of passwords? Maybe you can join the passwordless conversation.
0
0
1
Cybersecurity: are you cyber secure plugging into public USB chargers?
0
0
1
What is the current status of pros and cons for zero trust? A cybersecurity article.
0
0
0
"AI Empowers Novices to Launch Cyberattacks," by David @Geercom, says #AItools are turning #malicious actors and #teens with little technical expertise into #cyber #monsters. https://t.co/8BqFeaEotx
0
7
5
"Behind the Bybit Crypto Theft," by David @Geercom, describes the tricks used in the $1.46-billion @Bybit_Official #crypto theft, and the industry's shift to #realtime transaction #monitoring and stronger #verification in its wake. https://t.co/3oAXxDYJZu
0
1
3
Learn about smart home product cybersecurity and the new Cyber Trust Mark coming this year: https://t.co/Pga05qnfVr.
0
0
0
This one was popular on LinkedIn. I hope you enjoy it. It covers what the title says.
"Willow and the Countdown to Quantum Breaches," by David @Geercom, describes @GoogleQuantumAI's Willow chip and the race to develop the first Cryptographically Relevant Quantum Computer (#CRQC). https://t.co/LTt9Xo5icm
0
0
0
"Email Insecurity," by David @Geercom, describes how lax security practices exposed the #emails and passwords of 1,828 congressional aides and staffers. https://t.co/fy4Woh83H5
0
1
3
If you haven't heard, Capitol staffers used official email for social, dating, and adult sites. Threat actors who breached those social accounts found the email addresses with plaintext passwords. It poses some enormous cybersecurity risks.
0
0
1
That's a good point, @leeivyca
@CACMmag @geercom @CrowdStrike Interesting to see the description of the actual bug, but it does not mention another dimension: this flawed update obviously was not tested internally before it was shipped, because any QA test would have seen the crashes
0
0
0
You're probably already enjoying dogs and burgers or TOFU, which apparently doesn't always mean Top of Funnel. Coming into the weekend, my wonderful editor shared that he had posted a new feature article I just completed. It made my day. Enjoy your holiday!
"How CrowdStrike Stopped Everything," by David Geer (@geercom), describes the cascade of crashing systems caused by the @CrowdStrike IT outage. https://t.co/GxByC2bjHc
0
0
1
https://t.co/aqHhnMd7DY If you had trouble buying or servicing your vehicle recently, you need to read this! #cybersecurity #DMS #automobile
0
0
1
#Cybercrime #addict ArionKurtaj, a teen with #autism, was so brilliant at #hacking he made headlines by breaching #RockstarGames-Read my analysis of y he became addicted & wound up sentenced 2 a psych hospital in story by @geercom in @TheOfficialACM
https://t.co/f5mKbUnN34
0
1
2
How much do you know about what happens in legal cases against cybercriminals? In today's feature story, "Autistic Teen/Elite Cybercriminal Sentenced to Life in a Secure Hospital," I address some of the challenges to cybercrime sentencing. https://t.co/6s8NMiTjrQ
0
0
0