Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around.  Whenever there is something big in the news, you can bet that there will be criminals who will exploit it.  It has never been more...
Payment Card Skimming is Up during Pandemic forced Online Shopping

Payment Card Skimming is Up during Pandemic forced Online Shopping

Payment Card Skimming is Up during Pandemic forced Online Shopping During the pandemic people have basically stopped going to the local malls to shop and this has forced an increase the number of purchases they make on-line.  Well guess what cybercriminals are not...
HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business?  Turns out that their pre-installed Support Assistant Utility is quite insecure by design.  It is capable of exposing 250 client functions and is filled with vulnerabilities...
Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable! Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...

Time to Invest in Cybersecurity

Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack.  With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime.  Much...