Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step   Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores.  Additionally, businesses depend on older software applications are at a great risk...
Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors.  If you are not aware the Chinese...
Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Fake iPhone Jailbreak Site leads to Advertising Click Fraud

Fake iPhone Jailbreak Site leads to Advertising Click Fraud

Fake iPhone Jailbreak Site leads to Advertising Click Fraud   Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....