Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources

ease-of-use

Hi, honey. It’s mom. My phone is acting funny again.

26th July 201926th July 2019 peterglock

Whether it’s setting up access to a Netflix account on a smart TV or enabling personal email on an iPhone, some people—of all ages—have a hard time figuring out user-friendly […]

 Awareness, Baby Boomers, Be Aware, ease-of-use, family IT guy, generation X, intuitive tech, Malwarebytes, older users, smart phones, smart TV, Technology  Glock Takes Stock

Recent Posts

  • ENISA launches security mapping tool
  • 7 in 10 Cameras Are Running Outdated Firmware
  • Cyber security takes its place alongside UK’s armed services
  • Smith & Wesson targeted in cyberattack, report says
  • Apple Explains Mysterious iPhone 11 Location Requests

    Archives

    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019

    Categories

    • 101
    • 2fa
    • a week in security
    • AB 846
    • AB 873
    • adware
    • AdwCleaner
    • agent smith
    • Akamai
    • ALICE
    • Amazon
    • Amazon Elastic Compute Cloud
    • amazon prime
    • amazon prime day 2019
    • amazon prime phishing
    • Amazon web services
    • Amazong
    • Android
    • android malware
    • android Q beta
    • AndroidQ
    • antitrust
    • anunak
    • app permissions
    • Apple
    • apps
    • Ars Technica
    • Articles
    • Artificial Intelligence
    • assistance fraud
    • AT&T
    • atm attacks
    • atm cash-out attacks
    • atm fraud
    • atm malware
    • Automation
    • Awareness
    • aws
    • Baby Boomers
    • backdoor
    • Banking
    • banking phish
    • barnaby jack
    • Be Aware
    • Beta
    • Big Data
    • biometrics
    • bitcoin
    • bitcoin generators
    • Biz & IT
    • black box attacks
    • blog series
    • BlueKeep
    • Brave
    • Brave browser
    • Breach
    • Brian Krebs
    • british airways
    • Bruce Schneier
    • bugs
    • bundler
    • bundleware
    • Business
    • c-level
    • c-suites
    • c0decalc
    • California Consumer Privacy Act
    • call detail records
    • Cambridge Analytica
    • Capital One
    • Capital One data breach
    • Capital One hack
    • carbanak
    • Carbon Black
    • cash generators
    • Cellular
    • China
    • China Chopper
    • chrome
    • CIOs
    • CISO
    • CISOs
    • Cloud security
    • Cloudflare
    • CNBC Technology
    • CNET
    • code injection
    • compromise
    • Cookies
    • credential stuffing
    • credit monitoring
    • crowdstrike
    • CSOs
    • cutlet maker
    • Cyber Attack
    • Cyber Insurance
    • Cyberattacks
    • Cyberlaw
    • cybersecurity
    • daniel regalado
    • Dark Reading
    • Darkode
    • data
    • data at rest
    • data breach
    • data breach settlement
    • Data breaches
    • Data Broker
    • data in transit
    • data leaks
    • Data privacy
    • data privacy laws
    • data privacy legislation
    • data protection
    • Data Security
    • Data Security and Privacy Insider
    • data-loss
    • ddos
    • Deception
    • def con
    • defrauding the elderly
    • Department of Homeland Security
    • Deutsche Welle
    • developer's corner
    • development
    • digital bill of rights
    • Digital Business
    • Disconnect
    • distraction fraud
    • DNS
    • DNS servers
    • DNS-changer
    • domain controller
    • doordash
    • drive by
    • drop box
    • DuckDuckGo
    • ease-of-use
    • eavesdropping
    • EC2
    • EDR platforms
    • EFF
    • EK
    • EKs
    • Elasticsearch
    • electron
    • Electronic Frontier Foundation
    • Electronic Privacy Information Center
    • elizabeth warren
    • email
    • emotet
    • encryption
    • end to end encryption
    • enterprise
    • Equifax
    • Equifax breach
    • eris
    • EU
    • european union
    • Events
    • exes
    • exploit kit
    • exploit kits
    • exploits
    • Extenbro
    • extension
    • extensions for financial services
    • FaceApp
    • Facebook
    • Facial Recognition
    • Fallout
    • family IT guy
    • FBI
    • federal data privacy law
    • federal data privacy legislation
    • Federal Trade Commission
    • fintech
    • Flight 17
    • fraud
    • fraud prevention
    • FTC
    • funding cybersecurity
    • Gaming & Culture
    • gate
    • GDPR
    • General Data Protection Regulation
    • generation X
    • Germany
    • Ghostery
    • Glock Takes Stock
    • godlua
    • google
    • Google Chrome
    • google home audio
    • government cybersecurity
    • Graham Cluely
    • greendispenser
    • GreenFlash Sundown
    • hack
    • hacking
    • health care
    • HHS
    • Hospitals
    • iam
    • IBM
    • ICO
    • identity access management
    • identity theft
    • incident response
    • India
    • Information Security
    • infosec
    • internet service provider
    • intuitive tech
    • Investment
    • IoT
    • iPhone
    • ironpython
    • IT Governance
    • jackpotting
    • jailbreak
    • JD Supra
    • JPEG
    • Kaspersky
    • kill chain
    • Krebs on Security
    • LastPass
    • lavabit
    • law enforcement
    • lawfare
    • lazarus group
    • local government
    • logical attacks
    • login credentials
    • Lord EK
    • Mac
    • MacOS
    • Magecart
    • Magento
    • Magnitude
    • Maine
    • Malaysian Airlines
    • malicious domains
    • malicious IPs
    • malicious websites
    • malvertising
    • malware
    • malware removal
    • malware-based attack
    • Malwarebytes
    • marcus hutchins
    • Mark Zuckerberg
    • metropolitan police
    • microsoft
    • mirai
    • Mobile
    • mobile menace monday
    • mobile security
    • motherboard
    • municipalities
    • nation-state attack
    • network world
    • News
    • Nexus
    • njRAT
    • office 365
    • older users
    • online privacy
    • openpgp
    • operation soft cell
    • Opinion
    • opsec
    • padpin
    • Paige Thompson
    • pale moon
    • parental monitoring
    • parental monitoring apps
    • passwords
    • patching
    • payment
    • Penetration testing
    • penetration testing tools
    • permissions
    • personal information
    • personally identifiable information
    • phishing
    • Phobos
    • PII
    • ploutus
    • plugins
    • Poison Ivy
    • police
    • Policy
    • PoliticoEU
    • pre-installed software
    • preempt
    • preemption
    • privacy
    • project zero
    • propublica
    • protonmail
    • Purism
    • Pwnie Express
    • QR Code
    • QR code scam
    • ransomware
    • RATs
    • regulation
    • remediation and prevention
    • reports
    • Research
    • Researcher's corner
    • Resource
    • RIG
    • right to access
    • Ring doorbell
    • robocalls
    • Root certificate
    • roundup
    • router
    • rules-based segmentation
    • Russia
    • russian disinformation
    • ryuk
    • Salesforce
    • scam
    • scams
    • scheduled tasks
    • Science
    • sdelete
    • secure delete
    • secure messaging
    • Security
    • security breach
    • security engineering
    • security executives
    • security solutions
    • security tools
    • Sen. Ron Wyden
    • settlement
    • shoe shine
    • shoulder surfing
    • Signal
    • sim swap
    • skimmer
    • skimmers
    • skype
    • slack
    • smart home
    • smart phones
    • smart TV
    • SMS
    • sniffer
    • Social engineering
    • social engineering attacks
    • social media
    • social purpose company
    • social security numbers
    • software liability
    • Spelevo
    • SpyEye
    • stalkerware
    • stimulator
    • stuxnet
    • suceful
    • Supply Chain
    • surveillance
    • survey
    • SWATting
    • targeted spear phishing
    • tax
    • Tech
    • Tech Republic
    • Technology
    • The Telegraph
    • Threat analysis
    • threat intelligence
    • Threatpost
    • trade
    • travel
    • travelling
    • trickbot
    • trojan
    • trojans
    • TrustWave
    • twitter
    • tyupkin
    • Uncategorised
    • Underminer
    • updates
    • url
    • US data privacy laws
    • US data privacy legislation
    • US Federal Trade Commission
    • US Senate Judiciary Committee
    • usenix
    • Vermont
    • virustotal
    • Vivaldi
    • VPN servers
    • VT
    • vulnerabilities
    • vulnerability
    • wannacry
    • wardriving
    • web skimmers
    • web threat
    • Web threats
    • Week in security
    • Whaling
    • WhatsApp
    • Wiper
    • wire
    • Wired
    • X-Force Red
    • xfs middleware
    • ZDNET
    • zero days
    • Zeus
    • zoom zero-day

    Get in touch

    Email: [email protected]


    View Glock Enterprises Ltd profile on Ariba Discovery

    Pages

    • Blog
    • Privacy Policy
    • Resources
      • White Paper: Building a Business Case for Cybersecurity Asset Management
      • White Paper: Internet Connected Storage
      • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
      • Whitepaper: Coping with a flood of Data Subject Access Requests
      • Whitepaper: Cyber Deception
    • Services
    • Welcome

    The Latest from Facebook

    Glock Enterprises Ltd

    2 months ago

    Glock Enterprises Ltd

    If you fancy 30 minutes of watching a bald guy talk about the 5 questions you need to ask... youtu.be/bpZI9EoFt5E ... See MoreSee Less

    CyberChess 2019

    youtu.be

    My presentation at Cyberchess 2019 in Riga, Latvia. Includes a live (very simple) hack demo of wifi networks.

    Video

    View on Facebook
    ·Share

    Share on FacebookShare on TwitterShare on Linked InShare by Email

    Proudly powered by WordPress | Theme: Moesia by aThemes