Small Businesses should do a Risk Assessment on Kaspersky Software
Business is full of risk management opportunities. Every business has unique factors that may indicate a specific action. The recent...
BootStomp: Useful Tool in Researching Bootloaders
Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device is...
Lessons learned for small businesses from the Equifax data breach
Data on 143 million consumers was stolen from Equifax, which is estimated to be about 57% of all U.S. adults. The massive data breach was...
Bug Bounty Programs: Vehicle Specialty Often Difficult to Fill
The need for bug bounty programs began years ago as a void formed. The manufacturers were producing their goods and services, as to be...
Two Factor Authentication (2FA)
The attackers are generally on the prowl for new methods and attack points in order to better their opportunity to steal from the user....
Be Careful What You Share on Social Media
People are focused on posting their daily lives on the various social media sites. This may include vacation photos and updates, birthday...
Watch out for these new ransomware attacks
New ransomware and new variants of a previous ransomware are being observed by cyber security experts. The ransomware business is huge; a...
Phishing’s Latest Attack Message: Traffic Tickets
Phishing campaigns, unfortunately, have grown in prominence. There have been many successful attacks over the years. In order to continue...
Who is responsible when the smart city crashes?
Society is becoming ever-more connected on a daily basis. Consumers are able to check email from virtually anywhere, including the home,...
Real Estate Professionals are Increasing Targeted by Hackers
Real estate related cyber-crime is increased, according to cyber security experts. In many geographic markets, real estate inventory is...