Watch your USBs: Ahoy, USBHarpoon!
You would be hard pressed to find a person who has not in the least seen a USB. Most people have probably used a USB with their phones,...
Malware upgrade for Android!
Overall, there are two primary smartphone forms-the iPhone and Android. Of the two, the Android phones have been targeted at a much...
Static Long-Term Processes are not Welcome at InfoSec’s Door
Attacks on the enterprise and embedded systems are not slowing down. These are increasing as the attacks are expanding the...
Adidas Issues
Adidas IsMost people have seen or are aware of the Adidas brand of shoes, clothing, and other products. These are sold in retail...
Yet another reason to monitor your computer: RadRAT will give you an interesting day
Remote access tools (RATs) are an interesting tool to maliciously have placed on a system. When these initially were created years ago,...
Perils of Insecure Code: Ticketmaster UK Compromise
For consumers, ease of use in the user experience (EX) is paramount. This aspect of daily life draws consumers to the service. One aspect...
InfoSec Labor Shortage: AI to Supplement and Augment
Machine learning (ML) and artificial intelligence (AI) have been receiving increased attention in the media as of late. AI has been in...
The last thing they needed: Alaska DHSS breach
Most states have an agency, under various names, whose responsibility is to assist the citizens and public when this is needed. This may...
Banks not learning from their oversights: Phishing rules!
A bank robber, after being apprehended, years ago was asked: “Why did you rob the bank?” The simple and direct response was, “That’s...
Hey, those are my credentials!: MyHeritage Compromise
Attackers are consistently looking for the crown jewels of a business to exfiltrate. Generally, data tends to be the prime target with...