Jan 18, 2020 | Applications, Big Tech, browsers, Business, Compliance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Firefox, Government, Hackers, Hacking, Hacking, Homeland Security, Internet, Legacy Systems, Malware, Mozilla Firefox, Nationstates, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Vulnerabilities, warnings, Zero-Day
Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Jan 18, 2020 | Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, Computers, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Economic Disruption, Employees, Government, Hackers, Hacking, Hacking, Intellectual Property Theft, Internet, Iran, Nationstates, Passwords, Patching, Phishing, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Updates, Vulnerabilities, Wiper Malware
Cyber War isn’t Coming It is already Here! Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
Jan 11, 2020 | Business, cyberattacks, Cybercrime, Cybersecurity, Government, Hackers, Hacking, Intellectual Property Theft, Iran, Nationstates, Patching, Radio Show, Radio_Show, Security, Security Alerts, Updates, Vulnerabilities, Wiper Malware
Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks. Now they are focusing their efforts on SCADA systems often...
Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...