Connect with Joseph Steinberg

Joseph Steinberg, CyberSecurity Expert Witness and Board Member, mentioned in the media 2011-2019

CyberSecurity Expert Joseph Steinberg In The Media (2011-2019)

Cybersecurity Expert Joseph Steinberg frequently appears on television and radio, and in online and print media venues, contributing as a cybersecurity expert, privacy expert, and artificial intelligence (AI) expert, to discussions about relevant news. He also often discusses emerging technologies, and their potential impacts on human society.

In addition, he writes Joseph Steinberg – Totally Candid, an independent column that was previously carried for six years by Forbes and Inc. Joseph and his articles are quoted by others on a frequent basis, with some of his articles having been quoted in thousands of different venues. He is also cited in many cybersecurity and technology-related books and journals – for details please see Google Scholar – Joseph Steinberg. And, of course, as a cybersecurity expert witness he is also cited in various court-related documents.

Below is a selection of some of his media appearances between the years of 2011 and 2019. (Please click here to download a headshot of Joseph Steinberg.)

Joseph Steinberg

FOX: Staying safe from scammers as holiday shopping season begins (November 28, 2019)

CBS 9: VERIFY: Is mobile pay safer than paying with your credit card? (November 7, 2019)

SHRM: The Cybersecurity Challenge: With cyberthreats growing in sophistication, corporate digital security requires a real team effort (October 12, 2019)

CNBC: 5 things you should do if you suspect you were affected by the DoorDash data breach (September 27, 2019)

CNBC: Here’s everything a cyber criminal can do if they steal your credit card (September 26, 2019)

PJ Media: EU Restricts ‘Right to Be Forgotten’ Rule to European Websites Only (September 25, 2019)

Joseph Steinberg

ABC 7 Boston: Local experts say monitoring online posts for potential threats a difficult task (August 6, 2019)

CNBC: 5 things you should do immediately if you suspect you were affected by the Capital One data breach (July 30, 2019)

Breitbart: 5 Ways to Protect Yourself from the Capital One Data Breach (July 30, 2019)

KnowTechie: Here’s how to wipe all your data from FaceApp’s servers (July 19, 2019)

Parentology: Should you Prepare Your Kids To Use Artificial Intelligence (May 2, 2019)

FedTech: Post-Shutdown, CISA Carves Out a Space in Cybersecurity (April 18, 2019)

Joseph Steinberg

Parentology: Alexa and Privacy: What Families Should Know (April 10, 2019)

Parentology: Are Alexa, Google Assistant, and Siri Listening in on Your Kids? (April 3, 2019)

NTV (Russia): News (March 10, 2019)

NPR: ‘Virtual Kidnapping’ Scam On The Rise Around The U.S. (January 1, 2019)

CNBC: Should you freeze your credit after the Marriott data breach? Here’s what the experts say (November 30, 2018)

CNBC: Kanye West’s 000000 iPhone password and 7 other things you should never do (October 12, 2018)

Joseph Steinberg

TechRepublic: 4 risk management areas you need to pay attention to in 2019 (September 13, 2018)

TechRepublic: How to Make Your Small Business Unattractive to Cyberattackers (July 21, 2018)

Forbes: How Blockchain Technology Could Make Internet Applications Faster, Smarter, And Less Expensive (June 29, 2018)

GoDaddy: What is the cybersecurity skills gap and what does it mean for your business? (June 15, 2018)

WFMY News: Cracking Down On Spoof Phone Calls (June 12, 2018)

CBS: Your Royal Name? Figure It Out, But Don’t Post It, Here’s Why… (May 18, 2018)

Joseph Steinberg

Thrive Global: Words of Wisdom with Joseph Steinberg (March 23, 2018)

ThreatPost: Experts Call Facebook’s Latest Controversy A ‘Social Media Breach Of Trust’ (March 20, 2018)

CA: Hackers Stole ‘Weapons-Grade’ NSA Code (But Your Business Isn’t Defenseless) (February 1, 2018)

BBC (Brasil – Portuguese): 7 sinais de que o seu celular foi hackeado (e o que fazer) (January 21, 2018)

BBC (Mundo -Spanish): 7 señales de que tu teléfono móvil fue hackeado (y qué hacer al respecto) (January 19, 2018)

NB Herald: Inaugural CyberHub Summit Featured International Cybersecurity Experts Providing Real Solutions & Tips for Small to Mid-Size Companies (November 18, 2017)

Joseph Steinberg

Forbes: New Blockchain Platforms Emerge To Fight Cybercrime & Secure The Future (November 13, 2017)

CBC Television: CBC- Chinese student scam (November 12, 2017)

Newsweek: It Starts With A Terrifying Phone Call: How Criminals In Mexico Are Targeting American Families (November 4, 2017)

TEISS: Detection more important than prevention in cyber security, says Microsoft CTO (November 1, 2017)

CSO: Blockchain startup: 300000 DDoS attacks will cause $150B in damages this year (October 26, 2017)

ABC News: What criminals can do after stealing your cell phone number (October 21, 2017)

Joseph Steinberg

Channel 2 News: Dark Web Scan Offer: ANOTHER Reason To Freeze Your Credit (October 12, 2017)

USA Today: Just Say No To LinkedIn Requests From Strangers; Some May Be Phishing Scams (October 6, 2017)

CSO: Should CISOs join CEOs in the C-suite? (September 27, 2017)

Where: Don’t Post Travel Photos Until You Read This (September 14, 2017)

Bold TV: Were You Affected By the Equifax Hack? Here’s How Prevent It Next Time (September 12, 2017)

Reader’s Digest: If You Get a Call from a Number with These Area Codes, Don’t Pick Up—It’s a Scam (September 2017)

Joseph Steinberg

Consumer Affairs: Avoiding Amazon-related phishing scams (September 5, 2017)

CSO: Petya: Is it ransomware or cyberwarfare? (June 9, 2017)

VPN Mentor: SecureMySocial – Making Sure You Never Share Something That You Shouldn’t (June 26, 2017)

Inc.: This Startup Recruited a Hollywood Designer to Create the Coolest Cybersecurity Software You’ve Ever Seen (June 11, 2017)

Cheddar: Chipotle Payment System Hacked (May 2, 2017)

Chicago Tribune: Tips for staying safe while traveling (April 25, 2017)

Joseph Steinberg

Cheddar: Joseph Steinberg Talks Keys to Cybersecurity Incentives (April 5, 2017)

Yellow (Australia): 99% Of Aussie Kids Are Missing Out On The Education Method Of Nobel Prize Winners (April 5, 2017)

Cheddar: The UK wants in on Encrypted Info from Messaging Apps (March 29, 2017)

Asbury Park Press: Area code scam: Don’t get suckered (March 14, 2017)

Parade: Avoid This Phone Scam: Don’t Answer Calls From This Area Code (March 14, 2017)

The Clarion Ledger: Phone scammers using new tactics (March 10, 2017)

Brit & Co: This Is the Scary Reason Why You Shouldn’t Answer Calls from Strange Area Codes (March 10, 2017)

Good Housekeeping: To Avoid Scammers, Don’t Answer Calls From These Area Codes (March 8, 2017)

Hearst (National): BEWARE: Chase Bank phishing scam targeting customers (March 8, 2017)

Hearst (National): Phishing scams offering prizes on the rise: 5 ways to protect yourself (February 24, 2017)

GigaOm: Four Questions For: Joseph Steinberg (January 23, 2017)

WFMY News: Why You Shouldn’t Use Your Fingerprint To Get Into Your Phone (January 19, 2017)

Smart Data Collective: 3 Lessons for enterprise Businesses After Yahoo’s Admission of a Massive Data Breach (January 11, 2017)

CSO: CISOs shouldn’t wait until retirement for social security (September 22, 2016)

CNBC: A big threat facing the presidential election no one is talking about (September 2, 2016)

Nightly Business Report: Costs of state security hacks (September 1, 2016)

Inc: How This Startup Built a Wearable for Worst-Case Scenarios (August 22, 2016)

Business Insider: How Simplilearn Became One Of The Most Effective Education Startups In Recent Times (August 12, 2016)

Inc 42: Movers and Shakers of the Week (August 6, 2016)

CSO Today: Joseph Steinberg Joins Simplilearn Advisory Board (August 3, 2016)

The Economic Times (India):Simplilearn Redefines Training for Indian IT Industry (July 28, 2016)

Buzzfeed: How To Find Out If Your Twitter Account Is Vulnerable To Hackers (June 30, 2016)

Social Media Today: musical.ly is Dominating the Social World of Teens (June 21, 2016)

Entrepreneur: How Social Media Jeopardizes Data Security (May 19, 2016)

PC & Tech Authority: President Obama says smart guns might have a role to play in reducing shootings (May 5, 2016)

Business To Community: 5 Things to Avoid When Putting Your Company on Social Media (May 2, 2016)

Yahoo: Police examining Texas fitness trainer Missy Bevers’ prolific social media presence in her unsolved slaying (April 21, 2016)

Forbes: 5 Tips For Keeping Your Business Safe On Social Media With Joseph Steinberg (February 24, 2016)

I-Sight: Top 20 Tips for Preventing Data Theft (February 20, 2016)

Geek Time: Don’t let a tweet end your career (February 1, 2016)

Tabi Labo: Learn Seven Lessons From Martin Luther King (In Japanese) (February 1, 2016)

The Examiner: The ‘Internet of Things’ or IoT more common and hackable (January 7, 2016)

Business.com: The Security Risks in Social Media: Interview with Joseph Steinberg (January 5, 2016)

SC Magazine: Advantech described as ‘Lazy ‘in fixing vulnerability (December 7, 2015)

La Stampa: L’impronta digitale è più o meno sicura della password? (November 28, 2015)

Dow Jones MarketWach: Here’s a good reason to pay for your holiday gifts in cash (November 27, 2015)

Entrepreneur: The Top Social Media Tools for Working Smarter, Not Harder (November 5, 2015)
Also published by Fox News (November 5, 2015)

The Cheat Sheet: 4 Top CEOs Reveal Their Secrets to Career Success (October 18, 2015)

Inverse: The 5.6 Million-Fingerprint Breach Could Haunt Its Victims Forever: SecureMySocial CEO Joseph Steinberg On What Losing Fingerprint Identities Actually Means. (September 28, 2015)

WFMY-CBS: Fake LinkedIn Profiles & Why Social Media Won’t Stop Them (September 25, 2015)

CFO: Chinese Malware Hack Hits ‘Jailbroken’ iPhones (September 1, 2015)

Computerworld: Apple iPhone jailbreak? STOP! KeyRaider is your worst iOS nightmare made real (September 1, 2015)

USA Today: Cyber-shark sightings hit the digital world this summer (July 19, 2015) Also published by the Detroit Free Press, Albany Times Union, Post Bulletin, Government Technology, and others.

CNBC: The new ‘virtual’ kidnapping craze (July 9, 2015)

Money Magazine: What to Do When You Find a Lost Credit Card (July 2, 2015)

Entrepreneur: 4 Essentials to Secure Your Business Even From State-Sponsored Online Threats (June 3, 2015)
Also published by Fox News (June 3, 2015)

CIO: How your employees put your organization at risk (May 28, 2015)

ComputerWorld: ‘Venom’ vuln poisons your cloud (so patch now) (May 14, 2015)

Software Advice: Are Millennials the Latest Security Threat? (May 11, 2015)

The Week: Game of Thrones: is leak bad news for networks and fans? (April 13, 2015)

Secure Link: Landmark privacy and cybersecurity cases felt around the world (March 18, 2015)

Digital Guardian: Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools? (March 11, 2015)

Society for Human Resource Management: Lessons Learned from Anthem Data Breach (February 10, 2015)

Entrepreneur: Meet Memo, the Anonymous App That Could Revolutionize the Workplace (January 16, 2015)

CNBC: How people buy and sell illegal stuff online (January 8, 2015)

WFMY News: Is 2015 The Year Your Home Gets Hacked? (January 5, 2015)

Top Secret Writers: US Deploys a Laser-Laden Drone Hunter in the Persian Gulf (December 24, 2014)

Software Advice: A Rating of 2014’s Top Cybersecurity Issues (December 18, 2014)

MainStreet.com: Hotel Site Booking.com Targeted by Scammers: How to Protect Yourself (November 12, 2014)

Akihabara News: The Right To Be Forgotten in Japan (October 13, 2014)

Kansas City Star: Textbook’s sexist photos dismay advocate for women in science and related careers (October 7, 2014)

Financial Chronicle: Is India ready for an IT revolution? (October 7, 2014)

Deseret News: European court order pits free speech against privacy on the Internet (October 5, 2014)

Forbes: JP Morgan Chase Warns Customers About Massive Data Breach (October 2, 2014)

Risk Managament: Hacking the Hackers (October 1, 2014)

Forbes: America’s ‘Right to Be Forgotten’ Fight Heats Up (September 30, 2014)

Epoch Times Deutschland: The Fappening Nacktfoto-Hack: Ist es Strafbar die gehackten Promi-Bilder zu verbreiten? (September 30, 2014)

The Epoch Times: Can Sharing Hacked Celebrity Photos Get You Arrested or Sued? (September 29, 2014)

The Epoch Times: The Fappening 3: Cara Delevingne Nude Photos? Lauren O’Neil, Briana Evigan Purported Naked Pictures Uploaded As well (September 27, 2014)

U.S. Attitudes Toward the ‘Right to Be Forgotten’ IndustryView (September 5, 2014)

Newsphere Japan: {Article in Japanese} (September 4, 2014)

The Oracle: Leaked photos raise questions about iCloud security (September 4, 2014)

USA Today: Leaked nude pictures a violation of privacy (September 3, 2014)

BBC: Apple confirma cómo fueron pirateadas las cuentas de Jennifer Lawrence y otros famosos (September 2, 2014)

BBC: ¿Cómo robaron las fotos de Jennifer Lawrence? (September 2, 2014)

La Nacion: Hackers desnudan a las famosas en la web (September 2, 2014)

Puebla: Así robaron las fotos hot de Jennifer Lawrence y otras famosas (September 2, 2014)

Teletica: Las fotos privadas de las estrellas y el misterio de la filtración (September 2, 2014)

Latinos Post:Jennifer Lawrence’s Nude Photos Leaked; Rep Confirms it’s ‘Real’ (September 2, 2014)

WBAL: What We Can Learn From Celebrities’ Nude Photos Leak (September 2, 2014)

Tech2: 1.2 billion passwords stolen: Why the world isn’t entirely convinced (August 8, 2014)

Manila Standard: When everything is digital (July 21, 2014)

CBR: 5 reasons Heartbleed has been good for cyber security (July 21, 2014)

Information Age: 3 months on: The true impact of Heartbleed on the enterprise (July 2, 2014)

Triple Pundit: Heartbleed Continues to Threaten Internet Security and Consumer Trust (July 2, 2014)

Consumer Affairs: Don’t fall for utility bill scams (June 12, 2014)

The Spectator: Internet lives on after heartbleed (April 24, 2014)

Inman News: Are you ready for the next Heartbleed bug? (April 22, 2014)

ValueWalk: Mutual Fund Company Asks Clients To Change Passwords Amidst Virus (April 16, 2014)

Orlando Sentinal: Heartbleed bug: What passwords you need to change (April 14, 2014)

Tech Times: Heartbleed bug threats are serious; change passwords? Here’s why (April 11, 2014)

WFMY News: Don’t Call Back! Which Area Codes Schemers Are Using (March 31, 2014)

Main Street: Self-Defense in an Age of Credit Card Breaches (March 18, 2014)

WFMY News: How Your Fridge Can Be Used By Computer Hackers (February 7, 2014)

Payscale: Three Ways to Honor Martin Luther King, Jr. at Work (January 20, 2014)

Mainstreet.com: Murder By Internet (December 19, 2013)

CreditCards.com: What To Do When You Find A Lost Credit Card (December 3, 2013)

Politico: Security experts fear ACA vulnerabilities (November 5, 2013)

Risk Management: Trapping Hackers (May 2, 2013)

Credit Union Times: Threat of the Week: China’s Professional Hackers (March 11, 2013)

ZDNet: Security regulation for social networks won’t resolve breaches (February 6, 2013)

ZDNet: Enterprises using new tech to deceive hackers (January 28, 2013)

ZDNet: Specialization in non-security fields key to fighting cyberthreats (December 21, 2012)

ZDNet: Tech-savvy psychologists a boon for security
(November 5, 2012)

ZDNet: Cyberespionage Skills Go Beyond Technical Ability
(September 27, 2012)

Bank Info Security: Why Banks Can Expect More Attacks (September 24, 2012)

ZD Net: Authentication Questions Alone No Longer Safe (August 30, 2012)

SC Magazine: RSA finds phishing led to $687m in worldwide loses (August 23, 2012)

Your Security Resource: Find My Laptop – Your Guide to Device Location Services (August 23, 2012)

ZDNet: Social Engineering Threat Affects All (August 14, 2012)

ZDNet: Organizations Should Beware Search Engine Data
(August 10, 2012)

Phishing Attacks at All Time High: Psychological Approach Delivering Security as Technical Defenses Continue to Fail (July 25, 2012)

SC Magazine: A New Way to Net Phish (April 2, 2012)

BankInfoSecurity: Can DMARC Hook Online Phishers? Experts Debate Merits of E-Mail Authentication Initiative (February 29, 2012)

Also covered by GovInfoSecurity

(Note: My comments on DMARC are available here.)

ZDNet: Open source model creates new cybercrime frontier (February 23, 2012)

Green Armor CEO Discusses Weaknesses of New DMARC Anti-Phishing Initiative (February 15, 2012)

Also covered by Virtual Strategy magazine

ZDNet: Creative recruitment more effective for hiring security talent (January 4, 2012)

The Sun Setinel: Tips on how to shop safely online using public Wi-Fi (December 15, 2011)

TMC-Net: Green Armor’s SiteAuth Technology Now Available (December 13, 2011)

The Examiner: A Closer Look at Facebook Hackers (December 8, 2011)

Wired: Hackers Skim Lucky Supermarket Customers’ Credit Cards via Self-Checkout (December 7, 2011)

Arts Technica: Hackers Hit Supermarket Self-Checkout Lanes, Steal Money From Shoppers (December 7, 2011)

The Tech Herald: 2012 Predictions: Looking Ahead at the Threat Landscape (December 5, 2011)

Fox News: Could the U.S. Government Start Reading Your Emails? (December 3, 2011)

eCommerce Times: Feds Hound E-Commerce Counterfeiters on Cyber Monday (November 29, 2011)

Security News Daily: Porn and Gore Flood Facebook (November 15, 2011)

ZDNet: Online Anonymity Hard to Achieve But Not Impossible (November 9, 2011)

Also published in ZDNet-Australia (November 10, 2011)

Forbes: On China And Russia Hacking Into US, “No Hard Feelings” (November 8, 2011)

Reuters: Will depositing checks by phone open more doors to bank exits? (October 28, 2011)

Also published by The Huffington Post: Check Deposit Could Threaten Reign of Big Banks

 Also published by Newsday: Will depositing cheques by phone open more doors to bank exits?

The Jerusalem Post: Justice Ministry Cracks Case of Massive Information Theft (October 25, 2011)

Security News Daily: Small Businesses Need to Beware of Online Criminals (October 20, 2011)

Also published in Business News Daily

iVillage: How To Protect Your Cell Phone from Hackers (October 18, 2011)

Special Operations Technology: Cybersecurity (Volume 9 Issue 8 – October 2011 Issue)

Rebel Gaming: Sony Blames the Lastest Data Breach On YOU! (October 13, 2011)

Information Week: Sony Locks Accounts After Data Breach (October 12, 2011)

Security News Daily: 5 Security Tips to Mark National Cybersecurity Awareness Month (October 7, 2011)

Christian Science Monitor: Scarlett Johansson Cellphone Pictures Aren’t All That Smart Phone Hackers Are After (September 30, 2011)

Also covered in the Alaska Dispatch

And covered by CBS affiliates, Fox affiliates, NBC affiliates, and others on October 3, 2011

Linux Insider: That Was the Breach That Was (September 27, 2011)
Also covered by TechNewsWorld, Futeroa, Linux Planet

eCommerce Times: OnStar’s Plan to Keep Tabs on Ex-Customers Riles Lawmakers (September 26, 2011)

Also covered by the Nebraska News

ZD Net: Google Wallet holds promise but challenges ahead (September 26, 2011)

Albany Times Union: School Sports Ads Not Official (September 25, 2011)

eWeek: Mitsubishi Heavy Network Most Likely Compromised by Spear-Phishing Attack (September 21, 2011)

ZD Net: Improving security by removing admin rights not practical (September 20, 2011)

Nonprofit Coversation: The Hackers Are Coming: What Steps to Take NOW To Ensure Cybersecurity of Your Non-Profit (September 14, 2011)

PC Magazine: How Cybersecurity Has Changed Since 9/11 (September 8, 2011)
Also covered on various other sites

Fort Worth Star-Telegram: Police e-mails were vulnerable to hackers’ attack (September 7, 2011)

Bob’s Guide: Green Armor Offers Cybersecurity Assistance to Dutch Government After Breach(September 6, 2011)

The Statesman: Hackers Target Elgin-Based Police Chiefs Association (September 2, 2011)

The Christian Science Monitor: Who released the trove of unredacted WikiLeaks documents? (September 1, 2011) Part 1 and Part 2

Also covered in The Alaska Dispatch and The Minneapolis Post

Orange County Philanthropy Examiner: Nonprofit Cyber Security – How to Lock Your Electronic Door(August 26. 2011)

International Business Times: BART vs. Anonymous Shows the Hackers Will be Hard to Control (August 16, 2011)

Freedom Fighters or Vandals? No Consensus on Anonymous (August 16. 2011)

China USA Cyberwar

Appeared in the Contra Costa Times, the Silicon Valley Mercury News , and TMC Net.

Bank Info Security: Fighting Cybercrime (August 12, 2011)

Rutgers University: Information Protection and Security (August 11, 2011)

Bank Info Security: Cracking Down on Phishing (August 10, 2011)

For the most recent cybersecurity-related articles mentioning/quoting Joseph Steinberg please click HERE.

For cybersecurity-related articles from 2020-2021 mentioning/quoting Joseph Steinberg please click HERE.

For older cybersecurity-related articles mentioning/quoting Joseph Steinberg (from 2010 and before) please click HERE.

For cybersecurity-related articles written by Joseph Steinberg please click HERE.