Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Nation-State Cybecriminals and Economic Disruption

Nation-State Cybecriminals and Economic Disruption

Nation-State Cybecriminals and Economic Disruption   Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information   Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program   McAfee anti-virus software has a very serious vulnerability in its code execution.  No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...