The Latest in Tech Today

The number of Users make this Company a Hacking Target

The number of Users make this Company a Hacking Target

The number of Users Makes this Company a Hacking Target   One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...

read more
Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers Playground   Microsoft made news recently at the annual Black Hat conference in Las Vegas, generating a lot of buzz about its discovery of a malicious Russian hacker group using some common Internet of Things (IoT)...

read more
Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities   Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. The applications...

read more
Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup   PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...

read more
Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin    For years, we have commented on the Swedish government and the Riksbank pushing for a “cashless society.” The Riksbank has over 1,000 articles posted on its website on the “cashless society“. The emphasis worked: between...

read more
Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn    Facebook confirmed on Tuesday it’s hiring a team of veteran journalists to help curate stories in its soon-to-launch news tab. The company confirmed the plans after The New York Times reported that Facebook is...

read more
Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans    Cybercriminals have been using ransomware to profit off of unprepared victims for more than a decade. Ransomware rose to infamy when the WannaCry and NotPetya attacks struck the world. Recently, attackers have...

read more
Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One   Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...

read more
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...

read more
Want To Be A Security Pro —- Tips Here!

Want To Be A Security Pro —- Tips Here!

Want To Be A Security Pro —- Tips Here!   As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...

read more
Your Cyber Insurance Policy Probably Won’t Pay Out

Your Cyber Insurance Policy Probably Won’t Pay Out

Your Cyber Insurance Policy Probably Won’t Pay Out   More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy. After years of...

read more
Technology Makes Crime Easier

Technology Makes Crime Easier

Technology Makes Crime Easier   In part one of TechRepublic's four-part series "Mastermind con-man behind Catch Me If You Can talks cybersecurity" TechRepublic's Karen Roby sat down with Frank Abagnale, the famous con man turned FBI Academy instructor, who...

read more
Huge Valuation’s Lead to Huge Losses…Again.

Huge Valuation’s Lead to Huge Losses…Again.

Huge Valuation’s Lead to Huge Losses…Again.   A ghost of unicorns past ominously re-surfaced yesterday evening.  Verizon agreed to sell its blogging website Tumblr to Automattic, the owner of WordPress.com, for less than $3 million, according to Axios. It’s crazy...

read more
Another Reason to Check Those Daily Deliveries

Another Reason to Check Those Daily Deliveries

Another Reason to Check Those Daily Deliveries   Penetration testers have long gone to great lengths to demonstrate the potential chinks in their clients' networks before less friendly attackers exploit them. But in recent tests by IBM's X-Force Red, the...

read more
MacBooks Get Grounded — for Good Reason

MacBooks Get Grounded — for Good Reason

MacBooks Get Grounded — for Good Reason   The Federal Aviation Administration has banned certain 15-inch MacBook Pros with potentially defective batteries from US flights. The move, which follows Apple's June recall announcement, is part of a general FAA policy...

read more
Poor Performing ISP Looses Customers

Poor Performing ISP Looses Customers

On the 10th anniversary of the App store, it’s time to delete most of your apps Poor Performing ISP Loses Customers   Frontier Communications yesterday reported lower revenue and a $5.45 billion goodwill impairment charge, and it warned investors that its revenue...

read more