Perils of Insecure Code: Ticketmaster UK Compromise
For consumers, ease of use in the user experience (EX) is paramount. This aspect of daily life draws consumers to the service. One aspect...
InfoSec Labor Shortage: AI to Supplement and Augment
Machine learning (ML) and artificial intelligence (AI) have been receiving increased attention in the media as of late. AI has been in...
The last thing they needed: Alaska DHSS breach
Most states have an agency, under various names, whose responsibility is to assist the citizens and public when this is needed. This may...
Banks not learning from their oversights: Phishing rules!
A bank robber, after being apprehended, years ago was asked: “Why did you rob the bank?” The simple and direct response was, “That’s...
Hey, those are my credentials!: MyHeritage Compromise
Attackers are consistently looking for the crown jewels of a business to exfiltrate. Generally, data tends to be the prime target with...
Naval AI Application: Unmanned Submarines
AI is a massively growing field in this nation and abroad. There are a few fields this is not applicable to. The application itself...
Consumers Targeted Again: Android Phones with Pre-Loaded Malware
Generally, when a consumer purchases their new smartphone, the routine is set. The phone is purchased, the consumer is rather exuberant,...
Connect with your InfoSec department.
With any project involving IT assets, there is a process to have the plan/process approved. This procedure is in place to keep the...
Atlanta: Issues, Part II
The city of Atlanta operations had been severely crippled in March 2018, arising from a rather serious and in-depth ransomware attack....
California’s Version of GDPR: Applicable to Consumer Embedded Systems?
California recently passed an aggressive data privacy law. The California legislature passed AB375 (The California Consumer Privacy Act...