CyberSecurity Expert Joseph Steinberg In The Media (2011-2019)
Cybersecurity Expert Joseph Steinberg frequently appears on television and radio, and in online and print media venues, contributing as a cybersecurity expert, privacy expert, and artificial intelligence (AI) expert, to discussions about relevant news. He also often discusses emerging technologies, and their potential impacts on human society.
In addition, he writes Joseph Steinberg – Totally Candid, an independent column that was previously carried for six years by Forbes and Inc. Joseph and his articles are quoted by others on a frequent basis, with some of his articles having been quoted in thousands of different venues. He is also cited in many cybersecurity and technology-related books and journals – for details please see Google Scholar – Joseph Steinberg. And, of course, as a cybersecurity expert witness he is also cited in various court-related documents.
Below is a selection of some of his media appearances between the years of 2011 and 2019. (Please click here to download a headshot of Joseph Steinberg.)
FOX: Staying safe from scammers as holiday shopping season begins (November 28, 2019)
CBS 9: VERIFY: Is mobile pay safer than paying with your credit card? (November 7, 2019)
CNBC: Here’s everything a cyber criminal can do if they steal your credit card (September 26, 2019)
PJ Media: EU Restricts ‘Right to Be Forgotten’ Rule to European Websites Only (September 25, 2019)
Breitbart: 5 Ways to Protect Yourself from the Capital One Data Breach (July 30, 2019)
KnowTechie: Here’s how to wipe all your data from FaceApp’s servers (July 19, 2019)
Parentology: Should you Prepare Your Kids To Use Artificial Intelligence (May 2, 2019)
FedTech: Post-Shutdown, CISA Carves Out a Space in Cybersecurity (April 18, 2019)
Parentology: Alexa and Privacy: What Families Should Know (April 10, 2019)
Parentology: Are Alexa, Google Assistant, and Siri Listening in on Your Kids? (April 3, 2019)
NTV (Russia): News (March 10, 2019)
NPR: ‘Virtual Kidnapping’ Scam On The Rise Around The U.S. (January 1, 2019)
CNBC: Kanye West’s 000000 iPhone password and 7 other things you should never do (October 12, 2018)
TechRepublic: 4 risk management areas you need to pay attention to in 2019 (September 13, 2018)
TechRepublic: How to Make Your Small Business Unattractive to Cyberattackers (July 21, 2018)
WFMY News: Cracking Down On Spoof Phone Calls (June 12, 2018)
CBS: Your Royal Name? Figure It Out, But Don’t Post It, Here’s Why… (May 18, 2018)
Thrive Global: Words of Wisdom with Joseph Steinberg (March 23, 2018)
CA: Hackers Stole ‘Weapons-Grade’ NSA Code (But Your Business Isn’t Defenseless) (February 1, 2018)
Forbes: New Blockchain Platforms Emerge To Fight Cybercrime & Secure The Future (November 13, 2017)
CBC Television: CBC- Chinese student scam (November 12, 2017)
ABC News: What criminals can do after stealing your cell phone number (October 21, 2017)
Channel 2 News: Dark Web Scan Offer: ANOTHER Reason To Freeze Your Credit (October 12, 2017)
CSO: Should CISOs join CEOs in the C-suite? (September 27, 2017)
Where: Don’t Post Travel Photos Until You Read This (September 14, 2017)
Bold TV: Were You Affected By the Equifax Hack? Here’s How Prevent It Next Time (September 12, 2017)
Consumer Affairs: Avoiding Amazon-related phishing scams (September 5, 2017)
CSO: Petya: Is it ransomware or cyberwarfare? (June 9, 2017)
Cheddar: Chipotle Payment System Hacked (May 2, 2017)
Chicago Tribune: Tips for staying safe while traveling (April 25, 2017)
Cheddar: Joseph Steinberg Talks Keys to Cybersecurity Incentives (April 5, 2017)
Cheddar: The UK wants in on Encrypted Info from Messaging Apps (March 29, 2017)
Asbury Park Press: Area code scam: Don’t get suckered (March 14, 2017)
Parade: Avoid This Phone Scam: Don’t Answer Calls From This Area Code (March 14, 2017)
The Clarion Ledger: Phone scammers using new tactics (March 10, 2017)
Good Housekeeping: To Avoid Scammers, Don’t Answer Calls From These Area Codes (March 8, 2017)
Hearst (National): BEWARE: Chase Bank phishing scam targeting customers (March 8, 2017)
GigaOm: Four Questions For: Joseph Steinberg (January 23, 2017)
WFMY News: Why You Shouldn’t Use Your Fingerprint To Get Into Your Phone (January 19, 2017)
CSO: CISOs shouldn’t wait until retirement for social security (September 22, 2016)
CNBC: A big threat facing the presidential election no one is talking about (September 2, 2016)
Nightly Business Report: Costs of state security hacks (September 1, 2016)
Inc: How This Startup Built a Wearable for Worst-Case Scenarios (August 22, 2016)
Inc 42: Movers and Shakers of the Week (August 6, 2016)
CSO Today: Joseph Steinberg Joins Simplilearn Advisory Board (August 3, 2016)
The Economic Times (India):Simplilearn Redefines Training for Indian IT Industry (July 28, 2016)
Buzzfeed: How To Find Out If Your Twitter Account Is Vulnerable To Hackers (June 30, 2016)
Social Media Today: musical.ly is Dominating the Social World of Teens (June 21, 2016)
Entrepreneur: How Social Media Jeopardizes Data Security (May 19, 2016)
Business To Community: 5 Things to Avoid When Putting Your Company on Social Media (May 2, 2016)
I-Sight: Top 20 Tips for Preventing Data Theft (February 20, 2016)
Geek Time: Don’t let a tweet end your career (February 1, 2016)
Tabi Labo: Learn Seven Lessons From Martin Luther King (In Japanese) (February 1, 2016)
The Examiner: The ‘Internet of Things’ or IoT more common and hackable (January 7, 2016)
Business.com: The Security Risks in Social Media: Interview with Joseph Steinberg (January 5, 2016)
SC Magazine: Advantech described as ‘Lazy ‘in fixing vulnerability (December 7, 2015)
La Stampa: L’impronta digitale è più o meno sicura della password? (November 28, 2015)
Dow Jones MarketWach: Here’s a good reason to pay for your holiday gifts in cash (November 27, 2015)
Entrepreneur: The Top Social Media Tools for Working Smarter, Not Harder (November 5, 2015)
Also published by Fox News (November 5, 2015)
The Cheat Sheet: 4 Top CEOs Reveal Their Secrets to Career Success (October 18, 2015)
WFMY-CBS: Fake LinkedIn Profiles & Why Social Media Won’t Stop Them (September 25, 2015)
CFO: Chinese Malware Hack Hits ‘Jailbroken’ iPhones (September 1, 2015)
USA Today: Cyber-shark sightings hit the digital world this summer (July 19, 2015) Also published by the Detroit Free Press, Albany Times Union, Post Bulletin, Government Technology, and others.
CNBC: The new ‘virtual’ kidnapping craze (July 9, 2015)
Money Magazine: What to Do When You Find a Lost Credit Card (July 2, 2015)
Entrepreneur: 4 Essentials to Secure Your Business Even From State-Sponsored Online Threats (June 3, 2015)
Also published by Fox News (June 3, 2015)
CIO: How your employees put your organization at risk (May 28, 2015)
ComputerWorld: ‘Venom’ vuln poisons your cloud (so patch now) (May 14, 2015)
Software Advice: Are Millennials the Latest Security Threat? (May 11, 2015)
The Week: Game of Thrones: is leak bad news for networks and fans? (April 13, 2015)
Secure Link: Landmark privacy and cybersecurity cases felt around the world (March 18, 2015)
Society for Human Resource Management: Lessons Learned from Anthem Data Breach (February 10, 2015)
Entrepreneur: Meet Memo, the Anonymous App That Could Revolutionize the Workplace (January 16, 2015)
CNBC: How people buy and sell illegal stuff online (January 8, 2015)
WFMY News: Is 2015 The Year Your Home Gets Hacked? (January 5, 2015)
Top Secret Writers: US Deploys a Laser-Laden Drone Hunter in the Persian Gulf (December 24, 2014)
Software Advice: A Rating of 2014’s Top Cybersecurity Issues (December 18, 2014)
Akihabara News: The Right To Be Forgotten in Japan (October 13, 2014)
Financial Chronicle: Is India ready for an IT revolution? (October 7, 2014)
Forbes: JP Morgan Chase Warns Customers About Massive Data Breach (October 2, 2014)
Risk Managament: Hacking the Hackers (October 1, 2014)
Forbes: America’s ‘Right to Be Forgotten’ Fight Heats Up (September 30, 2014)
The Epoch Times: Can Sharing Hacked Celebrity Photos Get You Arrested or Sued? (September 29, 2014)
U.S. Attitudes Toward the ‘Right to Be Forgotten’ IndustryView (September 5, 2014)
Newsphere Japan: {Article in Japanese} (September 4, 2014)
The Oracle: Leaked photos raise questions about iCloud security (September 4, 2014)
USA Today: Leaked nude pictures a violation of privacy (September 3, 2014)
BBC: ¿Cómo robaron las fotos de Jennifer Lawrence? (September 2, 2014)
La Nacion: Hackers desnudan a las famosas en la web (September 2, 2014)
Puebla: Así robaron las fotos hot de Jennifer Lawrence y otras famosas (September 2, 2014)
Teletica: Las fotos privadas de las estrellas y el misterio de la filtración (September 2, 2014)
Latinos Post:Jennifer Lawrence’s Nude Photos Leaked; Rep Confirms it’s ‘Real’ (September 2, 2014)
WBAL: What We Can Learn From Celebrities’ Nude Photos Leak (September 2, 2014)
Tech2: 1.2 billion passwords stolen: Why the world isn’t entirely convinced (August 8, 2014)
Manila Standard: When everything is digital (July 21, 2014)
CBR: 5 reasons Heartbleed has been good for cyber security (July 21, 2014)
Information Age: 3 months on: The true impact of Heartbleed on the enterprise (July 2, 2014)
Triple Pundit: Heartbleed Continues to Threaten Internet Security and Consumer Trust (July 2, 2014)
Consumer Affairs: Don’t fall for utility bill scams (June 12, 2014)
The Spectator: Internet lives on after heartbleed (April 24, 2014)
Inman News: Are you ready for the next Heartbleed bug? (April 22, 2014)
ValueWalk: Mutual Fund Company Asks Clients To Change Passwords Amidst Virus (April 16, 2014)
Orlando Sentinal: Heartbleed bug: What passwords you need to change (April 14, 2014)
Tech Times: Heartbleed bug threats are serious; change passwords? Here’s why (April 11, 2014)
WFMY News: Don’t Call Back! Which Area Codes Schemers Are Using (March 31, 2014)
Main Street: Self-Defense in an Age of Credit Card Breaches (March 18, 2014)
WFMY News: How Your Fridge Can Be Used By Computer Hackers (February 7, 2014)
Payscale: Three Ways to Honor Martin Luther King, Jr. at Work (January 20, 2014)
Mainstreet.com: Murder By Internet (December 19, 2013)
CreditCards.com: What To Do When You Find A Lost Credit Card (December 3, 2013)
Politico: Security experts fear ACA vulnerabilities (November 5, 2013)
The Coming Cyber-Cold War: US Pioneering Online Attacks(July 30, 2013)
Risk Management: Trapping Hackers (May 2, 2013)
Credit Union Times: Threat of the Week: China’s Professional Hackers (March 11, 2013)
ZDNet: Security regulation for social networks won’t resolve breaches (February 6, 2013)
ZDNet: Enterprises using new tech to deceive hackers (January 28, 2013)
ZDNet: Specialization in non-security fields key to fighting cyberthreats (December 21, 2012)
ZDNet: Tech-savvy psychologists a boon for security
(November 5, 2012)
ZDNet: Cyberespionage Skills Go Beyond Technical Ability
(September 27, 2012)
Bank Info Security: Why Banks Can Expect More Attacks (September 24, 2012)
ZD Net: Authentication Questions Alone No Longer Safe (August 30, 2012)
SC Magazine: RSA finds phishing led to $687m in worldwide loses (August 23, 2012)
Your Security Resource: Find My Laptop – Your Guide to Device Location Services (August 23, 2012)
ZDNet: Social Engineering Threat Affects All (August 14, 2012)
ZDNet: Organizations Should Beware Search Engine Data
(August 10, 2012)
SC Magazine: A New Way to Net Phish (April 2, 2012)
Also covered by GovInfoSecurity
(Note: My comments on DMARC are available here.)
ZDNet: Open source model creates new cybercrime frontier (February 23, 2012)
Green Armor CEO Discusses Weaknesses of New DMARC Anti-Phishing Initiative (February 15, 2012)
Also covered by Virtual Strategy magazine
MIC: Cyber Warfare: The War America is Losing (January 27, 2012)
ZDNet: Creative recruitment more effective for hiring security talent (January 4, 2012)
The Sun Setinel: Tips on how to shop safely online using public Wi-Fi (December 15, 2011)
TMC-Net: Green Armor’s SiteAuth Technology Now Available (December 13, 2011)
The Examiner: A Closer Look at Facebook Hackers (December 8, 2011)
Wired: Hackers Skim Lucky Supermarket Customers’ Credit Cards via Self-Checkout (December 7, 2011)
The Tech Herald: 2012 Predictions: Looking Ahead at the Threat Landscape (December 5, 2011)
Fox News: Could the U.S. Government Start Reading Your Emails? (December 3, 2011)
eCommerce Times: Feds Hound E-Commerce Counterfeiters on Cyber Monday (November 29, 2011)
Security News Daily: Porn and Gore Flood Facebook (November 15, 2011)
ZDNet: Online Anonymity Hard to Achieve But Not Impossible (November 9, 2011)
Also published in ZDNet-Australia (November 10, 2011)
Forbes: On China And Russia Hacking Into US, “No Hard Feelings” (November 8, 2011)
Reuters: Will depositing checks by phone open more doors to bank exits? (October 28, 2011)
Also published by The Huffington Post: Check Deposit Could Threaten Reign of Big Banks
Also published by Newsday: Will depositing cheques by phone open more doors to bank exits?
The Jerusalem Post: Justice Ministry Cracks Case of Massive Information Theft (October 25, 2011)
Security News Daily: Small Businesses Need to Beware of Online Criminals (October 20, 2011)
Also published in Business News Daily
iVillage: How To Protect Your Cell Phone from Hackers (October 18, 2011)
Special Operations Technology: Cybersecurity (Volume 9 Issue 8 – October 2011 Issue)
Rebel Gaming: Sony Blames the Lastest Data Breach On YOU! (October 13, 2011)
Information Week: Sony Locks Accounts After Data Breach (October 12, 2011)
Also covered in the Alaska Dispatch
And covered by CBS affiliates, Fox affiliates, NBC affiliates, and others on October 3, 2011
Linux Insider: That Was the Breach That Was (September 27, 2011)
Also covered by TechNewsWorld, Futeroa, Linux Planet
eCommerce Times: OnStar’s Plan to Keep Tabs on Ex-Customers Riles Lawmakers (September 26, 2011)
Also covered by the Nebraska News
ZD Net: Google Wallet holds promise but challenges ahead (September 26, 2011)
Albany Times Union: School Sports Ads Not Official (September 25, 2011)
ZD Net: Improving security by removing admin rights not practical (September 20, 2011)
PC Magazine: How Cybersecurity Has Changed Since 9/11 (September 8, 2011)
Also covered on various other sites
Fort Worth Star-Telegram: Police e-mails were vulnerable to hackers’ attack (September 7, 2011)
The Statesman: Hackers Target Elgin-Based Police Chiefs Association (September 2, 2011)
The Christian Science Monitor: Who released the trove of unredacted WikiLeaks documents? (September 1, 2011) Part 1 and Part 2
Also covered in The Alaska Dispatch and The Minneapolis Post
Freedom Fighters or Vandals? No Consensus on Anonymous (August 16. 2011)
Appeared in the Contra Costa Times, the Silicon Valley Mercury News , and TMC Net.
Bank Info Security: Fighting Cybercrime (August 12, 2011)
Rutgers University: Information Protection and Security (August 11, 2011)
Bank Info Security: Cracking Down on Phishing (August 10, 2011)
For the most recent cybersecurity-related articles mentioning/quoting Joseph Steinberg please click HERE.
For cybersecurity-related articles from 2020-2021 mentioning/quoting Joseph Steinberg please click HERE.
For older cybersecurity-related articles mentioning/quoting Joseph Steinberg (from 2010 and before) please click HERE.
For cybersecurity-related articles written by Joseph Steinberg please click HERE.