Shane Schick

Editor and writer specializing in enterprise IT, marketing and advertising, fashion and style.

    Microsoft Patches CryptoAPI Flaw Following Discovery From NSA

    Microsoft used its first Patch Tuesday update of the new decade to address a critical vulnerability in its CryptoAPI library. A default feature within Windows that’s also known as Crypt32.dll, the CryptoAPI patch addresses a bug that could allow…

    Microsoft used its first Patch Tuesday update of the new decade to address a critical vulnerability in its CryptoAPI library. A default feature within Windows that’s also known as Crypt32.dll, the CryptoAPI patch addresses a bug that could allow…

    Microsoft used its first Patch Tuesday update of the new decade to address a critical vulnerability in its CryptoAPI library. A default feature within Windows that’s also known as Crypt32.dll, the CryptoAPI patch addresses a bug that could allow…

    Cable Haunt Leaves an Estimated 200 Million Modems Open to Potential Attacks

    An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said could give attackers complete control over their victims’ devices. First discovered and detailed in a site set up by a Denmark-based…

    An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said could give attackers complete control over their victims’ devices. First discovered and detailed in a site set up by a Denmark-based…

    An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said could give attackers complete control over their victims’ devices. First discovered and detailed in a site set up by a Denmark-based…

    Microsoft Sway Domains Used in Phishing Campaigns to Create Bogus Landing Pages

    A phishing technique that makes use of Microsoft Sway could attack organizations even if they don’t use the tool, security researchers warn. Cybercriminals are able to create landing pages that look like legitimate online content and dupe victims…

    A phishing technique that makes use of Microsoft Sway could attack organizations even if they don’t use the tool, security researchers warn. Cybercriminals are able to create landing pages that look like legitimate online content and dupe victims…

    A phishing technique that makes use of Microsoft Sway could attack organizations even if they don’t use the tool, security researchers warn. Cybercriminals are able to create landing pages that look like legitimate online content and dupe victims…

    Jan 7, 2020
    Esports outlook 2020: What brands need to become winning players

    Editor's Note: This is part of a series of pieces looking at the year to come that Marketing Dive will publish throughout January. For more on what to expect in the months ahead, check out 7 trends that show 2020 will be a make-or-break year for…

    Editor's Note: This is part of a series of pieces looking at the year to come that Marketing Dive will publish throughout January. For more on what to expect in the months ahead, check out 7 trends that show 2020 will be a make-or-break year for…

    Editor's Note: This is part of a series of pieces looking at the year to come that Marketing Dive will publish throughout January. For more on what to expect in the months ahead, check out 7 trends that show 2020 will be a make-or-break year for…

    Pulse VPN Bug Means ‘Big Game Ransomware’ Could Access Corporate Networks

    Large organizations may be targeted by “big game ransomware” if they risk leaving a vulnerability in Pulse Secure virtual private network (VPN) servers unpatched, a cybersecurity researcher warned. In a post on his Double Pulsar blog, Kevin Beaumont…

    Large organizations may be targeted by “big game ransomware” if they risk leaving a vulnerability in Pulse Secure virtual private network (VPN) servers unpatched, a cybersecurity researcher warned. In a post on his Double Pulsar blog, Kevin Beaumont…

    Large organizations may be targeted by “big game ransomware” if they risk leaving a vulnerability in Pulse Secure virtual private network (VPN) servers unpatched, a cybersecurity researcher warned. In a post on his Double Pulsar blog, Kevin Beaumont…

    4 Things to Do If You Think Your Business Has Been Hacked

    Get your free guide on how to respond to mobile security breaches — or thwart them altogether. Cybercriminals can strike at any time. Data won’t be lost conveniently just after a backup has been performed, or when systems are temporarily down for…

    Get your free guide on how to respond to mobile security breaches — or thwart them altogether. Cybercriminals can strike at any time. Data won’t be lost conveniently just after a backup has been performed, or when systems are temporarily down for…

    Get your free guide on how to respond to mobile security breaches — or thwart them altogether. Cybercriminals can strike at any time. Data won’t be lost conveniently just after a backup has been performed, or when systems are temporarily down for…

    Samsung and BlueJeans Reinvent the Huddle Room

    A long oak table, enough swivel chairs for a football team, an expansive view of a city skyline — this is the stock art ideal we’ve come to associate with the term “business meeting.” Too bad that image is often hopelessly out of date. Besides the…

    A long oak table, enough swivel chairs for a football team, an expansive view of a city skyline — this is the stock art ideal we’ve come to associate with the term “business meeting.” Too bad that image is often hopelessly out of date. Besides the…

    A long oak table, enough swivel chairs for a football team, an expansive view of a city skyline — this is the stock art ideal we’ve come to associate with the term “business meeting.” Too bad that image is often hopelessly out of date. Besides the…

    Nearly a Quarter of a Million RSA Keys Broken Using Certificate Vulnerability

    Almost 250,000 RSA keys were found to be broken as part of an investigation into a certificate vulnerability that could compromise internet of things (IoT) devices such as connected cars and medical implants. Based on an analysis of approximately 175…

    Almost 250,000 RSA keys were found to be broken as part of an investigation into a certificate vulnerability that could compromise internet of things (IoT) devices such as connected cars and medical implants. Based on an analysis of approximately 175…

    Almost 250,000 RSA keys were found to be broken as part of an investigation into a certificate vulnerability that could compromise internet of things (IoT) devices such as connected cars and medical implants. Based on an analysis of approximately 175…

    Dec 17, 2019
    Experiential hospitality: Guests check in but will brands overstay their welcome?

    With interest in experiential marketing showing no signs of waning, marketers this year kicked their efforts up a notch by extending the idea of a real-world pop-up into a chance to stay overnight with a brand — an attempt to deepen the relationship…

    With interest in experiential marketing showing no signs of waning, marketers this year kicked their efforts up a notch by extending the idea of a real-world pop-up into a chance to stay overnight with a brand — an attempt to deepen the relationship…

    With interest in experiential marketing showing no signs of waning, marketers this year kicked their efforts up a notch by extending the idea of a real-world pop-up into a chance to stay overnight with a brand — an attempt to deepen the relationship…

    How Do I Use Samsung’s Find My Phone Service?

    When someone who loses their smartphone manages to get it back, it’s not uncommon to hear them say something along the lines of, “Thank goodness — my life is in there!” It would be accurate to add that, in many cases, access to their company’s entire…

    When someone who loses their smartphone manages to get it back, it’s not uncommon to hear them say something along the lines of, “Thank goodness — my life is in there!” It would be accurate to add that, in many cases, access to their company’s entire…

    When someone who loses their smartphone manages to get it back, it’s not uncommon to hear them say something along the lines of, “Thank goodness — my life is in there!” It would be accurate to add that, in many cases, access to their company’s entire…

    How to Move On From a Cybersecurity Incident

    Cybersecurity incidents can cost people their jobs. Organizations can lose customers as their share price tanks. Customers’ personal and confidential information can be put at risk. And when the incident has finally been contained, there’s still a…

    Cybersecurity incidents can cost people their jobs. Organizations can lose customers as their share price tanks. Customers’ personal and confidential information can be put at risk. And when the incident has finally been contained, there’s still a…

    Cybersecurity incidents can cost people their jobs. Organizations can lose customers as their share price tanks. Customers’ personal and confidential information can be put at risk. And when the incident has finally been contained, there’s still a…

    Lazarus Group Targets macOS Users With Fileless Malware Threat

    MacOS computer users are being targeted by the Lazarus hacker collective with fileless malware that’s designed to resemble a cryptocurrency trading app. Best known as the group linked to major cyberattacks such as WannaCry and the hack on Sony…

    MacOS computer users are being targeted by the Lazarus hacker collective with fileless malware that’s designed to resemble a cryptocurrency trading app. Best known as the group linked to major cyberattacks such as WannaCry and the hack on Sony…

    MacOS computer users are being targeted by the Lazarus hacker collective with fileless malware that’s designed to resemble a cryptocurrency trading app. Best known as the group linked to major cyberattacks such as WannaCry and the hack on Sony…

    StrandHogg Flaw Triggers Phishing Pages and Permission Requests Across 36 Android Apps

    An in-app security vulnerability dubbed StrandHogg is being exploited in at least 36 Android apps and triggering malicious code, researchers warned. Initially discovered by Promon and Lookout, the flaw allows cybercriminals to take advantage of the…

    An in-app security vulnerability dubbed StrandHogg is being exploited in at least 36 Android apps and triggering malicious code, researchers warned. Initially discovered by Promon and Lookout, the flaw allows cybercriminals to take advantage of the…

    An in-app security vulnerability dubbed StrandHogg is being exploited in at least 36 Android apps and triggering malicious code, researchers warned. Initially discovered by Promon and Lookout, the flaw allows cybercriminals to take advantage of the…

    Meet the Behind-the-Scenes Companies Powering the Smart Home

    Home / Trending Tech / Internet of Things Get expert insights on boosting operational efficiencies and creating new business opportunities with IoT. Listen Now Whether it’s a house, an apartment building or some other kind of property, behind every…

    Home / Trending Tech / Internet of Things Get expert insights on boosting operational efficiencies and creating new business opportunities with IoT. Listen Now Whether it’s a house, an apartment building or some other kind of property, behind every…

    Home / Trending Tech / Internet of Things Get expert insights on boosting operational efficiencies and creating new business opportunities with IoT. Listen Now Whether it’s a house, an apartment building or some other kind of property, behind every…

    RevengeHotels Takes Up Residence in Front Desk Systems to Steal Guest Credit Card Data

    A malware campaign dubbed RevengeHotels has successfully infected systems running the front desks of more than 20 hotels across multiple countries in an attempt to steal guests’ credit card information. Research published by Kaspersky Labs late last…

    A malware campaign dubbed RevengeHotels has successfully infected systems running the front desks of more than 20 hotels across multiple countries in an attempt to steal guests’ credit card information. Research published by Kaspersky Labs late last…

    A malware campaign dubbed RevengeHotels has successfully infected systems running the front desks of more than 20 hotels across multiple countries in an attempt to steal guests’ credit card information. Research published by Kaspersky Labs late last…

    Dec 1, 2019
    Steven Bartlett, a twenty-something CEO (@Steven), on the Problem with “Influencers” and What’s Next in Social Media

    Steven Bartlett just can’t seem to move forward. It’s not that the founder and CEO of Social Chain is in the kind of mental or spiritual funk that he tries to help his followers escape through inspirational quotes on platforms like Instagram. He’s…

    Steven Bartlett just can’t seem to move forward. It’s not that the founder and CEO of Social Chain is in the kind of mental or spiritual funk that he tries to help his followers escape through inspirational quotes on platforms like Instagram. He’s…

    Steven Bartlett just can’t seem to move forward. It’s not that the founder and CEO of Social Chain is in the kind of mental or spiritual funk that he tries to help his followers escape through inspirational quotes on platforms like Instagram. He’s…

    Nov 29, 2019
    The co-founder of MenWith shares his fashion journey from Instagram to a retailer near you

    If you’re going to cut someone’s head off, try t do it with the affectionate gentility that Daniel Frank and the team behind MenWith demonstrate almost every day. On Instagram accounts like MenWithClass and MenWithStyle, you’ll see some of the…

    If you’re going to cut someone’s head off, try t do it with the affectionate gentility that Daniel Frank and the team behind MenWith demonstrate almost every day. On Instagram accounts like MenWithClass and MenWithStyle, you’ll see some of the…

    If you’re going to cut someone’s head off, try t do it with the affectionate gentility that Daniel Frank and the team behind MenWith demonstrate almost every day. On Instagram accounts like MenWithClass and MenWithStyle, you’ll see some of the…

    Stantinko Botnet Hides Cryptomining Malware Inside YouTube Video Descriptions

    Youtube is normally a place where content creators want to be as visible as possible, but the Stantinko botnet has been using the online video service as a place to hide malware for cryptocurrency attacks. Attackers are using proxies to facilitate…

    Youtube is normally a place where content creators want to be as visible as possible, but the Stantinko botnet has been using the online video service as a place to hide malware for cryptocurrency attacks. Attackers are using proxies to facilitate…

    Youtube is normally a place where content creators want to be as visible as possible, but the Stantinko botnet has been using the online video service as a place to hide malware for cryptocurrency attacks. Attackers are using proxies to facilitate…

    Exploit Code Escalates Apache Solr Vulnerability To ‘High Risk’ Status

    New exploit code has led researchers to reclassify a security threat aimed at the Linux enterprise search tool Apache Solr to “high severity status.” Affected hardware could be hit with remote code execution (RCE) attacks that take advantage of a…

    New exploit code has led researchers to reclassify a security threat aimed at the Linux enterprise search tool Apache Solr to “high severity status.” Affected hardware could be hit with remote code execution (RCE) attacks that take advantage of a…

    New exploit code has led researchers to reclassify a security threat aimed at the Linux enterprise search tool Apache Solr to “high severity status.” Affected hardware could be hit with remote code execution (RCE) attacks that take advantage of a…

    Nov 22, 2019
    Drift CMO Tricia Gellman discusses her new role, key priorities and the future of conversational marketing

    When they first told her she was going to be reassigned to the marketing department, Tricia Gellman went home and cried. It may seem like a surprising reaction for someone who has helped lead demand generation and brand-building for firms like…

    When they first told her she was going to be reassigned to the marketing department, Tricia Gellman went home and cried. It may seem like a surprising reaction for someone who has helped lead demand generation and brand-building for firms like…

    When they first told her she was going to be reassigned to the marketing department, Tricia Gellman went home and cried. It may seem like a surprising reaction for someone who has helped lead demand generation and brand-building for firms like…