Blockchain applicable to cybersecurity: Not just buzzword bingo
Blockchain has grown in use exponentially over the last few years. People are trying to apply this to virtually anything possible. This...
Small Village Targeted for Ransomware
Day after day, Jefferson village simply operated as they did the day before, the day before that, etc. Each day passed without anything...
Top Phishing Subject Line: “Payment Notification”
Phishing is widely used by many different attackers against their targets. This has historically been a very profitable attack vector....
Another keyless vehicle hack: Key fobs to the inverse rescue
Vehicles are synonymous with the US culture. These are pervasive through commercials, print ads, radio, the vast number of vehicles on...
Phishing data sources continue to abound
Phishing data sourcesA cloud is a useful tool for many functions. This has been an asset when used to increase computing processing...
Ransomware affects every industry
Ports are exceptionally important to the economy. The shipping across the ocean brings a mass amount of containers with tons of goods,...
Vehicle Cybersecurity Professionals-Still a Difficult Position to Fill
In the metro-Detroit area, the primary industry and revenue force is the auto industry. This is clear due to the number and concentration...
BackSwap Returns
The attackers and malware coders have a focus. These persons are looking for data to steal and sell or manipulate. One area which...
Another Municipality with Issues
Government entities tend to have a unique situation. The entity has a set amount of revenue received annually. There are fluctuations...
Another payment portal breach-Here we go again: GovPayNow.com
Third party vendors have historically been the Achilles heel of the business world for years. The examples of this abound through the...