The Latest in Tech Today
Block 90 percent of Malware with this
Block 90 percent of Malware with this We all know about Uniform Record Locators or URLs that web browsers use to bring us the pages that we are looking for. These act as the “street” address of the document. The first part of the address that ends in .com,...
Last Generation Legislators Trying to Solve Next Generation Security Issues
Last Generation Legislators Trying to Solve Next Generation Security Issues As we all know, Cybercrime has been rising precipitously, and the criminals and nation-states are becoming more and more sophisticated in their abilities to use the internet to carry out their...
Peeping on Toms
Peeping on Toms Many of us have a lovable tomcat who stays at home while we are at work. We all love our pets! Now taking care of them is getting even easier with the advent of an assortment of digital and technological devices. This sector is growing...
Protecting Company Assets and Cybersecurity Insurance
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...
January’s Coming – Do You Have An Incident Response Plan?
January’s Coming - Do You Have An Incident Response Plan If you have a Massachusetts based business or do business in the State of Massachusetts there are some big changes coming your way in January 2020. Last year Massachusetts instituted some changes to their...
Call 611 Now — Hackers Breach 1M Cellular Customers
Call 611 Now -- Hackers Breach 1M Cellular Customers Cybercriminals will go after anyone who has an expolitable vulnerability. Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...
The Convenience of Facial Recognition is not All Its Cracked up to be
The Convenience of Facial Recogition is not All Its Cracked Up to Be As technologies advance many of them are sold to us as a convenience. Nowhere is this more evident as in the whole face recognition for security arena. Think about how much trouble companies...
Is Machine Learning pushing Healthcare or Healthcare pulling in Machine Learning
Is Machine Learning pushing Healthcare or Healthcare pulling in Machine Learning The healthcare industry is rapidly utilizing the advancements in machine learning to evaluate and aid humans in processing the vast and complex medical datasets and then analyze...
Nation-State Cybecriminals and Economic Disruption
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
The Road To Machine Learning Wars
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Upping your Incident Response Game — New Regulations coming
Upping your Incident Response Game -- New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need to...
Why Zero Trust Is the Answer to Internet Everywhere Connections
Why Zero Trust Is the Answer to Internet Everywhere Connections Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Cybercriminals return to old-school ID theft tactics
Cybercriminals return to old-school ID theft tactics As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...
Reduce Vulnerabilities by Ditching Android
Reduce Vulnerabilities by Ditching Android Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...
Big Data, Data Brokers and Your Information
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Tackling Ransomware on Windows
Tackling Ransomware on Windows Microsoft has 1 billion Windows-OS powered PCs in use worldwide which explains why they are such a big target for hackers. There are a number of Windows security threats that everyone needs to be aware of including potentially...
Cellular Throttling and Why it cost AT&T a Chunk of Change
Cellular Throttling and Why it cost AT&T a Chunk of Change We are all familiar with cell carriers and their different plans -- some of which seem to change as fast as the weather in New England. All of them have some type of an ulimited plan -- but the...
The hanging of an MSP “Shingle” and Your Business Security
The hanging of an MSP “Shingle” and Your Business Security Are you in the cross hairs of hackers? How can a hacker multiply his efforts? By attacking a company who protects other companies. Hackers new targets are the Managed Services providers (MSPs) because...
Hiring and Issues with Scam Online Applications
Hiring and Issues with Scam Online Applications With the economy buzzing along and employment at a full time high -- finding workers for seasonal part time employment is getting harder and harder. However, these employers are now having to compete with scam...
Another “Pay–ment” System Introduced
Another “Pay--ment” System Introduced Contactless payment solutions are becoming quite popular and now Facebook will be launching their version, Facebook Pay. Although not used like the current other contactless systems, you will be able to use it on all their social...
Hand in Hand On Black Friday — Shopping and Privacy
Hand in Hand On Black Friday --- Shopping and Privacy Black Friday is almost upon us! The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...
Imposter Retailers Outnumber Legitimate Ones
Imposter Retailers Outnumber Legitimate Ones Are you ready for the extreme online shopping season! While you can purchase items online anytime, holiday e-commerce sales reached $126 billion last year with Cyber Monday online purchases generating $7.9 billion...
Don’t Take The Bait – Fake Sexual Harassment Claims
Don’t Take The Bait - Fake Sexual Harassment ClaimsScammers are phishing employees of large corporations using fake US EEOC sexual harrassment complaints to offload trojan payloads of Trickbot malware onto corporate computers which direct them to hand over sensitive...
Can You Detect A Phishing Attempt?
Can You Detect A Phishing Attempt? Cybercriminals are getting better at crafting believable and sophisticated ilephishing emails that are undetectable from legitimate emails. Do you know how to spot them? If you suspect that an email is not legitimate you can...
Vulnerability in Popular Anti-Virus Program
Vulnerability in Popular Anti-Virus Program McAfee anti-virus software has a very serious vulnerability in its code execution. No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...
Bots Losing Panache as Cybercriminals Hire In Third World
Bots Losing Panache as Cybercriminals Hire In Third World As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Future Defense and Military Tech
Future Defense and Military TechWarfare is changing which means that the way we fight and the weapons we use will need to change. Much of the technology that we enjoy and use everyday, initially came from technology developed by and for the military and for space...
Best Practices in Authentication Still Mostly Ignored By Businesses
Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems? They use many tactics but on of the easiest is through the use of compromised credentials. The problems is that these are real valid credentials...
Job Dissatisfaction is prominent among IT Security Professionals
Job Dissatisfaction is prominent among IT Security Professionals Many Cybersecurity professionals love a challenge. They do not enjoy the doldrums of make work security. They long for excitement and challenging work. They are in demand so it is not suprising...