Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step   Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Privacy and China — Not So Much

Privacy and China — Not So Much

Privacy and China — Not So Much China is planning on developing its digital currency due to the rising costs of currency circulation and lack of control. China, a communist society, wants to control everything about its citizens. That goes on to include how,...
Exploitable Vulnerability Allows Major VPN Breaches – NORDVPN and Others

Exploitable Vulnerability Allows Major VPN Breaches – NORDVPN and Others

Exploitable Vulnerability Allows Major VPN Breaches 3000 Servers hacked, the blame is being pointed at a third-party provider utilizing a remote management system in the data center. Who owned the data center? That would be NordVPN, a popular consumer VPN provider....
Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors.  If you are not aware the Chinese...
Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections   Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...