The Latest in Tech Today

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target - the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly. A...

read more
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...

read more
Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen   If it is connected it can be hacked.  The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...

read more
Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...

read more
Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable   IoT or Internet of Things devices are becoming more and more popular.  It seems that all types of items we never considered to require connectivity are now connected to the internet.  They are constantly passing...

read more
Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations   It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why?  Medical data is worth big bucks — up to...

read more
Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data   Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed.  Well, these under $20 devices can be connected in computers...

read more
Security 101 – Passwords and Password Management

Security 101 – Passwords and Password Management

Common Password Vulnerabilities and How to Avoid Them   There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...

read more
Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step   Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...

read more
International News Hits the Dark Web

International News Hits the Dark Web

International News Hits the Dark Web   Privacy is paramount, and it is one reason that the US government designed and implemented the TOR project. Now there is another reason, and that is preventing censorship of thought. That is the main reason that major...

read more
Cloud Players Vie for Pentagon Contract

Cloud Players Vie for Pentagon Contract

Cloud Players Vie for Pentagon Contract   The Pentagon wants to make their data more accessible to their divisions no matter the location and began looking for a trusted Cloud Provider. They put out a bid for their Joint Enterprise Defense Infrastructure (JEDI.)...

read more
Privacy and China — Not So Much

Privacy and China — Not So Much

Privacy and China -- Not So Much China is planning on developing its digital currency due to the rising costs of currency circulation and lack of control. China, a communist society, wants to control everything about its citizens. That goes on to include how, when,...

read more

Are PaleBlue Batteries Your Next Battery?

Although they're still in Kickstarter, I managed to get my hands on some PaleBlue batteries. So far, so good. Pale Blue says that these batteries will save you some $3,000 But, they'll also save you a ton of hassles and time! They have built-in micro-USB ports you can...

read more
Walking through Virtual Reality to Work

Walking through Virtual Reality to Work

Virtual Reality is coming to your walk to work.  Titled “DreamWalker” researchers at Microsoft are developing some new VR prototype technologies that they say allows people to safely navigate through real-world environments while envisioning themselves strolling in a...

read more
Plaintiffs in Facebook Class Action Awarded Standing

Plaintiffs in Facebook Class Action Awarded Standing

Plaintiffs in Facebook Class Action Awarded Standing   Plaintiffs in a $35 billion class-action suit against Facebook won their argument proving standing to sue. This lawsuit concerns the collection and storage of millions of users' biometric data without...

read more
Military Equipment — the Future is On our Door Step

Military Equipment — the Future is On our Door Step

Military Equipment -- the Future is On our Door StepAutonomous Military Vehicles are under development as part of the Army Futures Command Next-Generation Combat Vehicle program. Four companies have been selected to build non-developmental prototypes.  The hope is...

read more
They Look Cool But How Safe Are They?

They Look Cool But How Safe Are They?

They Look Cool but How Safe Are They?I have been warning about these embedded handles for a while.  As you may know, I spent 10+ years as a volunteer advanced EMT where I responded to a number of accidents.  Handles that completely fold inside the door are dangerous...

read more
Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything -- all the time.  Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...

read more