The Latest in Tech Today

Unique Ransomware Variants are Actively Propogating

Unique Ransomware Variants are Actively Propogating

Unique Ransomware Variants are Actively PropogatingRansomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called "Lockbit."...

read more
Backdoors in Apps Steal Your Senstive Data

Backdoors in Apps Steal Your Senstive Data

Backdoors in Apps Steal Your Senstive DataHackers will always find ways to distribute programs with backdoors. Enter the largest app store in the world, Google Play Store. We know that Google’s record of vetting apps on its app store is less than optimal. This lack of...

read more
BitTorrent and Pandemic:  A Match Made in Hacker Heaven

BitTorrent and Pandemic: A Match Made in Hacker Heaven

BitTorrent and Pandemic: A Match Made in Hacker HeavenThose who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...

read more
Terms of Service Violations are not Criminal Acts

Terms of Service Violations are not Criminal Acts

Terms of Service Violations are not Criminal ActsIn the United States, there is a law called the Computer Fraud and Abuse Act (CFAA), instilled to prevent hacking. With the advent of more regulatory information were are seeing on every website, terms of service, and...

read more
Intel No More: Apple Designs its Own Processors

Intel No More: Apple Designs its Own Processors

Intel No More: Apple Designs its Own ProcessorsCovid-19 spells the end for Intel (at least for Apple). Next year Apple will be using its own proprietary CPU's an GPU's in its products. They will be basing the design of these on their company developed chip in use in...

read more
Medical IoT Prone to Security Challenges

Medical IoT Prone to Security Challenges

 Medical IoT Prone to Security ChallengesHospitals are busy places, and anytime they can save time or make something more natural, they try to do so. Medical device companies are adding applications and creating real products to solve medical issues. Medical IoT...

read more
The Apple Exploit that Wasn’t

The Apple Exploit that Wasn’t

The Apple Exploit that Wasn’t“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store icon...

read more
Who Is Falling for COVID-19 Scams…Lots of People

Who Is Falling for COVID-19 Scams…Lots of People

Who Is Falling for COVID-19 Scams...Lots of PeopleHackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel the...

read more

Malicious Insiders Monetize Their Knowlege Using Dark Web

Malicious Insiders Monetize Their Knowlege Using Dark WebHave you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...

read more

Collaboration Platforms Using AI to Help Remote Workers

Collaboration Platforms Using AI to Help Remote Workers With hundreds of thousands to millions of employees working from home during this pandemic, businesses are seeking ways to collaborate more manageable and with better efficiency. There are several platforms, some...

read more
Cryptojacking

Cryptojacking

CryptojackingHi. Craig Peterson here with a blink into Cryptojacking.   Has your Android phone been getting hot? I mean really hot.   Has the battery life on your smartphone all of a sudden dropped to almost nothing?   How about your desktop or laptop web browser. Is...

read more
Pawned Accounts

Pawned Accounts

Pawned AccountsHi. Craig Peterson here with a blink into the stolen account business, also known as “Pwning.” [Prounced “poned” as in p-owned]     Pwned means that your account has been the victim of a data breach. Your username and password have been stolen from a...

read more
Multi-factor Authentication

Multi-factor Authentication

Multi-factor AuthenticationHi. Craig Peterson here with a blink into multi-factor authentication.   Two-factor authentication, also known as multi-factor authentication, provides some of the highest levels of security available — Something you know along with...

read more
VPNs and Security

VPNs and Security

VPNs and SecurityHi. Craig Peterson here with a blink into the dangers and benefits of VPNs.   VPNs originally were to connect business networks together over the Internet, saving thousands of dollars per month over leased lines.   Today, we’re using VPNs to watch...

read more
Accidental risks in the home and on the road

Accidental risks in the home and on the road

Accidental risks in the home and on the roadHi. Craig Peterson here with a blink into accidental risks in the home and on the road.   Some of the things we may not be thinking about when we’re working at home, or out of the office.    There’s the physical dangers:  ...

read more
Recognizing and Avoiding Spyware

Recognizing and Avoiding Spyware

Recognizing and Avoiding SpywareHi. Craig Peterson here with a blink into spyware.   To start with, the term "spyware" doesn't refer to the Russians. It isn’t the KGB. Spyware is also known as "adware."More specifically, it refers to software that, when installed on...

read more
Keeping Security Up-To-Date

Keeping Security Up-To-Date

Keeping Security Up-to-DateHi. Craig Peterson here with a blink into upgrades, updates, and patches.   Do you know which ones to pay attention to?   I’m sure you’ve heard about the Equifax breach. The records of 140 million Americans, along with some British and...

read more
Understanding Small Business Firewalls

Understanding Small Business Firewalls

Understanding Small Business FirewallsHi. Craig Peterson here.   Hackers are more active today than they ever have been, so we’re going to take a quick blink at Understanding Firewalls for your Small Business or Home.   When your computer is accessible through an...

read more
USB Security

USB Security

USB SecurityHi. Craig Peterson here with a blink into USB thumb drives.    Some of the characteristics of those thumb drives we all use create real security problems:   They’re easy to lose, and often contain private information. If you have encrypted your USB flash...

read more
Securing Wi-Fi

Securing Wi-Fi

Securing Wi-FiHi. Craig Peterson here with a blink into using Wifi.    Our online lives revolve around Wifi. At home, at the office, and on the road. We’ve had Wifi for years, and yet we often don’t configure or use it correctly.    In our homes and businesses, we...

read more
Secure Use of Computers in Public

Secure Use of Computers in Public

Secure Use of Computers in PublicHi. Craig Peterson here with a blink into using computers in public.   Most people have their own computers nowadays, but we are using them more-and-more in public.   We are plugging our devices into random USB ports to charge them. We...

read more
Using Webmail Securely

Using Webmail Securely

Using Webmail SecurelyHi. Craig Peterson here with a blink into using webmail securely.   The first free Webmail email services started in 1996. Remember Hotmail and Rocketmail? My friend Gary still uses Hotmail.    Today, the most popular Webmail service is gmail,...

read more
Why and When? Upgrades, Updates and Patches

Why and When? Upgrades, Updates and Patches

Why and When? Upgrades, Updates and PatchesHi. Craig Peterson here with a blink into understanding Upgrades, Updates, and Patches. When/How/Why’s   When vendors become aware of vulnerabilities in their products, they often issue patches to fix those vulnerabilities....

read more
Generate strong passwords/passphrases

Generate strong passwords/passphrases

Generate strong passwords/passphrasesHi. Craig Peterson here with a blink into secure passwords.   Many businesses insist that their eight character passwords are secure because they force complexity requirements, and frequent password updates.   Not true.    These...

read more
Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent ShortageBusinesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...

read more
Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus - Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace.  It is not meant to curtail all economic activity of the society. With this pandemic, governments...

read more
Contact Tracing = Limited Privacy

Contact Tracing = Limited Privacy

Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...

read more