The Latest in Tech Today

Cloud Services Have a Dark Side When It Comes To Security

Cloud Services Have a Dark Side When It Comes To Security

Cloud Services Have a Dark Side When It Comes To SecurityMore than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users. To gain a better...

read more
Can your CEO’s Voice be Faked?  How would you know?

Can your CEO’s Voice be Faked? How would you know?

Can your CEO’s Voice be Faked? How would you know?Fraudsters are constantly looking for new ways to scam their victims. One unique case gives the security industry a glimpse of what they could do with artificial intelligence (AI) and voice recording. As part of an...

read more
Security Alerts — How to tell Which are Important.

Security Alerts — How to tell Which are Important.

Security Alerts — How to tell Which are Important.   Alert fatigue is becoming a universal problem, and it's mainly due to a reactionary cybersecurity marketplace where security operations teams are challenged with transforming their approaches to keep pace with...

read more
Inflammation Problem Try Intermittent Fasting

Inflammation Problem Try Intermittent Fasting

Inflammation Problem Try Intermittent Fasting    Fasting could provide "enormous potential" in managing or preventing inflammation which is thought to contribute to type 2 diabetes, US researchers have said. A team from the Mount Sinai hospital report that...

read more
Paying Ransom’s Fuels Rise in Ransomware

Paying Ransom’s Fuels Rise in Ransomware

Paying Ransom’s Fuels Rise in Ransomware   On June 24, the mayor and council of Lake City, Florida, gathered in an emergency session to decide how to resolve a ransomware attack that had locked the city's computer files for the preceding fortnight. Following the...

read more
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...

read more
The number of Users make this Company a Hacking Target

The number of Users make this Company a Hacking Target

The number of Users Makes this Company a Hacking Target   One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...

read more
Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers Playground   Microsoft made news recently at the annual Black Hat conference in Las Vegas, generating a lot of buzz about its discovery of a malicious Russian hacker group using some common Internet of Things (IoT)...

read more
What is More Destructive a Nuclear Weapon or Cyber Attack

What is More Destructive a Nuclear Weapon or Cyber Attack

What is More Destructive a Nuclear Weapon or Cyber Attack   People around the world may be worried about nuclear tensions rising, but I think they’re missing the fact that a major cyberattack could be just as damaging – and hackers are already laying the...

read more
Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities   Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. The applications...

read more
Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers   A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...

read more
Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup   PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...

read more
Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin    For years, we have commented on the Swedish government and the Riksbank pushing for a “cashless society.” The Riksbank has over 1,000 articles posted on its website on the “cashless society“. The emphasis worked: between...

read more
Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn    Facebook confirmed on Tuesday it’s hiring a team of veteran journalists to help curate stories in its soon-to-launch news tab. The company confirmed the plans after The New York Times reported that Facebook is...

read more
Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans    Cybercriminals have been using ransomware to profit off of unprepared victims for more than a decade. Ransomware rose to infamy when the WannaCry and NotPetya attacks struck the world. Recently, attackers have...

read more
Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One   Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...

read more
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...

read more
Want To Be A Security Pro —- Tips Here!

Want To Be A Security Pro —- Tips Here!

Want To Be A Security Pro —- Tips Here!   As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...

read more
Your Cyber Insurance Policy Probably Won’t Pay Out

Your Cyber Insurance Policy Probably Won’t Pay Out

Your Cyber Insurance Policy Probably Won’t Pay Out   More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy. After years of...

read more
Technology Makes Crime Easier

Technology Makes Crime Easier

Technology Makes Crime Easier   In part one of TechRepublic's four-part series "Mastermind con-man behind Catch Me If You Can talks cybersecurity" TechRepublic's Karen Roby sat down with Frank Abagnale, the famous con man turned FBI Academy instructor, who...

read more
Huge Valuation’s Lead to Huge Losses…Again.

Huge Valuation’s Lead to Huge Losses…Again.

Huge Valuation’s Lead to Huge Losses…Again.   A ghost of unicorns past ominously re-surfaced yesterday evening.  Verizon agreed to sell its blogging website Tumblr to Automattic, the owner of WordPress.com, for less than $3 million, according to Axios. It’s crazy...

read more
Another Reason to Check Those Daily Deliveries

Another Reason to Check Those Daily Deliveries

Another Reason to Check Those Daily Deliveries   Penetration testers have long gone to great lengths to demonstrate the potential chinks in their clients' networks before less friendly attackers exploit them. But in recent tests by IBM's X-Force Red, the...

read more
Malcare WordPress Security