Speakers : Glenn Bingle and Hank Wolfla
Glenn Bingle will discuss the science of cyber security. He will give examples of all the current fishing Trojan horses and other cyber security breaches and hacking and phishing techniques from his own personal experience. Hank Wolfla will discuss simple easily implemented methodologies that you can use on your phone, iPad, television, or other Internet connected cyber digital technology! Both speakers will concentrate on the use of social media and artificial intelligence in protecting cyber security,
Glenn Bingle received a BA from the University of Massachusetts and his MD and PhD from IU. He was the medical director of Genetic Service and Counseling for Community Health Network and a Clinical Professor of Medicine and Medical Molecular Genetics at the IU School of Medicine. He has been a member of Scientech since 2018. Hank Wolfla received an associate degree and bachelor degree from Purdue University in 1965 and 1968. He taught at IU-Kokomo for a while before entering the bioengineering field. He has worked for Clarian, Community Hospital, and Hancock County Hospital. He helped to development instrumentation for the insertion of cardiac pacemakers, and received a patent for his design of an ergometer (exercise device) used in cardiac rehabilitation.
Program: The Science of Cyber Security and Practical Ways to Protect Your Online Activities
Speakers: Glenn Bingle, MD, PhD and Hank Wolfla, BS. Both have long and accomplished careers a
and are Scientech Club members.
Introduced By: Marty Meisenheimer
Attendance: NESC: 99; Zoom:
Guest(s): Bob Fisher, Bob Shortle, Dennis Matthews, Augustina Voss, Maria Nesterova
Scribe: Hank Wolfla
Editor: Bill Elliott
Talk’s Zoom recording found at: https://www.scientechclubvideos.org/zoom/07282025.mp4
Dr. Bingle began his talk on the science of cybersecurity, discussing why science is challenging to define. One reason is that there can be a narrow definition and a broader definition. He then referenced a set of PPT slides from an AI search that gives a good review. Next, Dr. Bingle said that elder fraud is skyrocketing and referenced examples of elder fraud.
The rest of his talk consisted of his own actual experiences with organizations and individuals using the internet, as well as the US Postal Service, to commit fraud against Dr. Bingle and his wife. Many in the audience have experienced this type of fraud firsthand. An excellent book, “Nobody’s Fool” by Daniel Simons and Christopher Chabris, says that the science of cybersecurity, at the basic level, is about the science of deception and trickery. The two science authors investigated what makes us vulnerable to deception, commonly referred to as scamming, in the digital age. The most effective strategies for countering deception are metacognition (thinking about thinking) slowing down decision making, seeking contrary evidence, considering alternative perspectives, pause and reflect, seeking diverse perspectives, considering the opposite, quantify decisions, thinking in probabilities, not absolutes, recognize emotional influence, play devil’s advocate, watching for patterns, and limiting social influence.
Hank Wolfla provided an overview of how to utilize software to mitigate digital threats and enhance computer security against cybersecurity threats. Ransomware, which many businesses have experienced, increased by 85% in the last year, and 70% of these incidents have affected
SMBs. Phishing (email) has increased by 1265% due to the growth of AI. These typically begin with
emails, and Dr. Bingle provided good examples of phishing. Device attacks utilize edge gateways to
compromise networks. Distributed Denial of Service increased by 31% in 2023.
How do you protect you and your computer from all these threats? Hank stressed the need for updates, such as addressing security vulnerabilities and enabling automatic updates. The types of cybersecurity software include antivirus and anti-malware products, firewalls, VPNs, Password Managers, Identity Theft Protection, and Encryption tools. The amount of software you need depends on what you use your computer for. re you concerned about your personal information, your financial information, and other information you do not want anyone else to have access to? Hank then went into detail about which software is best for each of the cybersecurity areas. Most of this information was obtained by utilizing various AI systems to determine the best 
Hank Wolfla & Glen Bingle