Lessons Learned from Uber’s Data Breach
Uber, the ride sharing company, recently announced a massive data breach that occurred in 2016, but ignored notifying the victims. The...
Message for the DoD: Security, It's Not just for Operations
Data comes in all forms and sizes. The composition of this also varies greatly dependent on the data owner. One actionable items...
Pertinent Log Management
In recent history there have been rather extensive and significant breaches affecting millions of people. This action has provided...
‘Tis the season…
Seemingly every year about this time, the phishing campaigns are presented to the consumers. The phishing emails have taken various forms...
SHA-1 still in use...
In May 2017, IE and Microsoft Edge finally began to note the SSL/TLS certificates signed with the well-used SHA-1 hashing protocol as...
Top 15 Cyber Security Tips for Traveling
The holiday travel season provides numerous opportunities for hacking of your devices while your enjoy yourself with friends and family....
Recent Compromise and Ransomware: Delayed Response with Medical Office
With each compromise involving a medical office, there are repercussions on many fronts. The patients will have to work through having...
Twitter: Useful Tool for Machine Learning (ML)
Data is literally everywhere. This may seem as though this is solely a benefit, however at times there is too much as it abounds. The...
Bosch Dongle Issue: Vulnerability Remediated
Earlier this year, a vulnerability was discovered with the Bosch Drivelog. This was noted by the Argus Cyber Security Research. The...
Small business WordPress users need to update software now
A critical level vulnerability was identified by a security expert, causing WordPress to issue a new release for its software. All small...