‘Tis the season…
Seemingly every year about this time, the phishing campaigns are presented to the consumers. The phishing emails have taken various forms...
SHA-1 still in use...
In May 2017, IE and Microsoft Edge finally began to note the SSL/TLS certificates signed with the well-used SHA-1 hashing protocol as...
Top 15 Cyber Security Tips for Traveling
The holiday travel season provides numerous opportunities for hacking of your devices while your enjoy yourself with friends and family....
Recent Compromise and Ransomware: Delayed Response with Medical Office
With each compromise involving a medical office, there are repercussions on many fronts. The patients will have to work through having...
Twitter: Useful Tool for Machine Learning (ML)
Data is literally everywhere. This may seem as though this is solely a benefit, however at times there is too much as it abounds. The...
Bosch Dongle Issue: Vulnerability Remediated
Earlier this year, a vulnerability was discovered with the Bosch Drivelog. This was noted by the Argus Cyber Security Research. The...
Small business WordPress users need to update software now
A critical level vulnerability was identified by a security expert, causing WordPress to issue a new release for its software. All small...
Less Than Suitable Security Invites Issues to Law Firm
It has been noted repeatedly that the persons intent on compromising company systems are not completing this endeavor for practice. Given...
Please Stop using WEP: Lesson from the Field
Recently I had the pleasure of attending GrrCON, a regional InfoSec conference in Michigan. The venue, talks, vendors, etc. were...
Machine Learning to Assist with InfoSec
Computers are rather adept at a large number of tasks, from the mundane to complex and dangerous. The users may want statistics applied...

