Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...
Feb 15, 2020 | Access Controls, Applications, Attack Vectors, Audit Logs, audit logs, automation, Business, Compliance, credentials, Cyber breaches, Data, data sharing, Elections, Elections, Government, Internet, Intricate Data Systems, Malware, News, Online Voting, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Voting Apps, Voting Technology
The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Feb 15, 2020 | Attack Vectors, CDC, CoronaVirus, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Hackers, Hacking, Internet, Nationstates, News, Organized Crime, Phishing, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology, third-world, WHO
Coronavirus bringing out opportunistic Hackers Whenever there is something in the news we find cybercriminals willing to exploit it in some way. Currently, the big news is the Coronavirus that is spreading from Wuhan, China. We have seen email malware being spread...
Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...