Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them   Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...

Warning About Security of Cryptocurrency

Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...
Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes ​ It seems as though there are countries that are intent on stealing our intellectual property and technology through fraud, and China appears to be one of the biggest perpetrators. Just this...