Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring?  Did you do your due diligence?  I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince.    ...
Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug What happens when a cable company shuts down a product they previously sold to customers?  What happens when they refuse to refund customers for proprietary products they purchased to support the...

Security First, Apple Stands Ground on iPhone Encryption

Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private.  To do that they use a proprietary encryption system. While there have been private companies who have tried to...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...