Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…

Read More

Microsoft has filed a civil suit to try to stop the spread of malware it has traced back to two main countries—Kuwait and Algeria. The company hopes this will be the most successful effort made by a non-governmental organization to combat cybercrime by attempting to stop key communication between the hackers and the PCs they are trying to infect.

Read More

Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.

Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.

Read More

At the end of March the Inspector General released a report on the effects of BYOD (bring your own device) on the U.S. military. The findings were a little worrying as the Military lacked some of the basic guidelines that many business have in place.       The following points are from the reports findings: Mobile devices were…

Read More