Phishing: It’s Not What’s for Dinner
Phishing has been in use in one form or another probably a week after the first email account was used by consumers. Phishing has become...
Please stop using the business centers in the hotels
As noted previously, I had the pleasure of attending GrrCON, the InfoSec conference in Grand Rapids, Michigan. The event was a complete...
Gorilla Glue Compromise: Data Not Glued Down
Gorilla Glue is known for their excellent set of products, and also their commercials. What has not been overly publicized, naturally, is...
MinerEye: Another Security Tool with a Twist
With regularity, new InfoSec tools are presented for the market to try and see if there is applicable use. A portion of these are...
Verizon’s 2018 DBIR
Verizon recently released its 11th edition of its Data Breach Investigations Report (DBIR). Worldwide, malware incidents declined in...
Twitter: Useful Tool for Machine Learning (ML)
Data is literally everywhere. This may seem as though this is solely a benefit, however at times there is too much as it abounds. The...
Recent Compromise and Ransomware: Delayed Response with Medical Office
With each compromise involving a medical office, there are repercussions on many fronts. The patients have to work through having their...
Still check the autofill: This will save you an apology
Too many applications are focused on convenience for the users over any other factor. This increases, in theory, productivity and the...
Not a good steward: DHS with multiple vulnerabilities
The national government is entrusted with many aspects of our lives. The law enforcement departments are tasked with applying the laws to...
Cities are Likewise Ransomware Targets
Recent stories have focused on ransomware, its implications, increased usage and complexity. With the usage, this is a natural...