The Latest in Tech Today

Nation-State Cybecriminals and Economic Disruption

Nation-State Cybecriminals and Economic Disruption

Nation-State Cybecriminals and Economic Disruption   Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...

read more
The Road To Machine Learning Wars

The Road To Machine Learning Wars

The Road To Machine Learning Wars   How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...

read more
Privacy, Security and SMS

Privacy, Security and SMS

Privacy, Security and SMS​   How many times a day do you send text messages? Do you even think about security when you do so? Most people don’t consider that all information contained within them is not private. That means that your short messages might be read...

read more
Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics   As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...

read more
Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android   Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...

read more
Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information   Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...

read more
Tackling Ransomware on Windows

Tackling Ransomware on Windows

Tackling Ransomware on Windows   Microsoft has 1 billion Windows-OS powered PCs in use worldwide which explains why they are such a big target for hackers.  There are a number of Windows security threats that everyone needs to be aware of including potentially...

read more
Hiring and Issues with Scam Online Applications

Hiring and Issues with Scam Online Applications

Hiring and Issues with Scam Online Applications   With the economy buzzing along and employment at a full time high -- finding workers for seasonal part time employment is getting harder and harder.  However, these employers are now having to compete with scam...

read more
Another “Pay–ment” System Introduced

Another “Pay–ment” System Introduced

Another “Pay--ment” System Introduced Contactless payment solutions are becoming quite popular and now Facebook will be  launching their version, Facebook Pay. Although not used like the current other contactless systems, you will be able to use it on all their social...

read more
Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday --- Shopping and Privacy   Black Friday is almost upon us!  The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...

read more
Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones   Are you ready for the extreme online shopping season!  While you can purchase items online anytime, holiday e-commerce sales reached $126 billion last year with Cyber Monday online purchases generating $7.9 billion...

read more
Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait - Fake Sexual Harassment ClaimsScammers are phishing employees of large corporations using fake US EEOC sexual harrassment complaints to offload trojan payloads of Trickbot malware onto corporate computers which direct them to hand over sensitive...

read more
Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?   Cybercriminals are getting better at crafting believable and sophisticated ilephishing emails that are undetectable from legitimate emails. Do you know how to spot them?  If you suspect that an email is not legitimate you can...

read more
Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program   McAfee anti-virus software has a very serious vulnerability in its code execution.  No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...

read more

Bots Losing Panache as Cybercriminals Hire In Third World

Bots Losing Panache as Cybercriminals Hire In Third World   As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...

read more
Future Defense and Military Tech

Future Defense and Military Tech

Future Defense and Military TechWarfare is changing which means that the way we fight and the weapons we use will need to change. Much of the technology that we enjoy and use everyday, initially came from technology developed by and for the military and for space...

read more
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target - the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly. A...

read more
National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok   Have you or Do your kids use TikTok?  TikTok is a wholely owned Chinese based video platform that is popular in social media circles. It boast a user base of a half-a-billion. What the government is...

read more
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...

read more
Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen   If it is connected it can be hacked.  The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...

read more
Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...

read more
Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable   IoT or Internet of Things devices are becoming more and more popular.  It seems that all types of items we never considered to require connectivity are now connected to the internet.  They are constantly passing...

read more
Malcare WordPress Security