Federal Trade Commission (FTC) and Lenovo: Superfish Epic Fail
Beginning in 2014, Lenovo began selling laptops with an app which was pre-loaded by Lenovo. The app compromised the laptop’s security and...
MacEwan University’s Epic Fail: Business Email Compromise (BEC) Claims Another Victim
There have been few attacks in the last five years that have been more success overall and on average than the phishing campaigns that...
Vicious cyber-attack on school district
Over 15,000 elementary and high school students were impacted by one horrific cyber-attack last week. An entire school district in...
Note to HR: InfoSec Applicants are not Necessarily Mainstream Or Ode to the InfoSec Personnel Paradi
They say the only constant is change. This is exceptionally applicable to the IT area and personnel at this junction. This is...
Small Businesses should do a Risk Assessment on Kaspersky Software
Business is full of risk management opportunities. Every business has unique factors that may indicate a specific action. The recent...
BootStomp: Useful Tool in Researching Bootloaders
Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device is...
Lessons learned for small businesses from the Equifax data breach
Data on 143 million consumers was stolen from Equifax, which is estimated to be about 57% of all U.S. adults. The massive data breach was...
Bug Bounty Programs: Vehicle Specialty Often Difficult to Fill
The need for bug bounty programs began years ago as a void formed. The manufacturers were producing their goods and services, as to be...
Two Factor Authentication (2FA)
The attackers are generally on the prowl for new methods and attack points in order to better their opportunity to steal from the user....
Be Careful What You Share on Social Media
People are focused on posting their daily lives on the various social media sites. This may include vacation photos and updates, birthday...