The Latest in Tech Today
Pandemics breed criminal scams and exploits
Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around. Whenever there is something big in the news, you can bet that there will be criminals who will exploit it. It has never been more...
Payment Card Skimming is Up during Pandemic forced Online Shopping
Payment Card Skimming is Up during Pandemic forced Online ShoppingDuring the pandemic people have basically stopped going to the local malls to shop and this has forced an increase the number of purchases they make on-line. Well guess what cybercriminals are not...
Stimulus Payments Easy to Intercept
Stimulus Payments Easy to Intercept If you are expecting a check from the US government you may be in for a surprise if you are one of the millions that are not required to file a tax return. For these people, the IRS has set up a site where they can give bank...
HP Computers Vulnerable to Attack
HP Computers Vulnerable to AttackHave you purchased an HP Computer for you home or business? Turns out that their pre-installed Support Assistant Utility is quite insecure by design. It is capable of exposing 250 client functions and is filled with vulnerabilities...
Fingerprint Authentication is Bypassable!
Fingerprint Authentication is Bypassable!Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...
Time to Invest in Cybersecurity
Time to Invest in CybersecurityEvery company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Watch out – Porn Scams by Email are back!
Watch out - Porn Scams by Email are back!Cybercriminals will try just about any tactic they can to get you to click on and accept their malware. One of their most successful have been scams related to pornography. These scams surround the possible situation that the...
Big Tech Contact Tracing – Antithetical to American Society
Big Tech Contact Tracing - Antithetical to American SocietyThe way that public health follows infection of a population is by tracing the contact of infected persons, and testing them is known as contact tracing. It is how epidemiologists aim to reduced clinical...
How to Evict Attackers Living Off Your Land
How to Evict Attackers Living Off Your LandWhy invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you? More...
Google sent users 40,000 warnings of nation-state hack attacks in 2019
Google sent users 40,000 warnings of nation-state hack attacks in 2019Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet
3 Mobile Security Problems That Most Security Teams Haven't Fixed YetWorkplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so do the...
Technology Empowers Pandemic Response, But Privacy Worries Remain
Technology Empowers Pandemic Response, But Privacy Worries Remain In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules scuttled...
Introducing Zero-Trust Access
Introducing Zero-Trust Access Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
The Risky Business Gamble of AI
The Risky Business Gamble of AIThe worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks. With almost everyone at home, they have more time to comment and research and share stories and opinions. This means that these...
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic Site
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic SiteThe entire Covid-19 pandemic has caused every business to question its capabilities whether from a business continuity standpoint or a complete re-imagining of its business practices. Some...
White-Hat Investigations Unveil Security Issues but Often at their own Peril
White-Hat Investigations Unveil Security Issues but Often at their own PerilIt is rare that any law can outpace technology or the tactics of cybercriminals. Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Monitoring Your Logs Can Prevent Business Ransomware Attacks
Monitoring Your Logs Can Prevent Business Ransomware AttacksRansomware gangs using some sophisticated tactics are able to break into company networks and look around for days and even weeks at a time before, exfiltrating extensive amounts of information without being...
Mandated Tracking and Reduced Freedom of Movement in Socialist Hong Kong
Mandated Tracking and Reduced Freedom of Movement in Socialist Hong KongIf you plan on visiting Hong Kong anytime in the near future be prepared to be tracked. You will be required to wear a wristband that monitors your movements to make sure you are obeying all...
Several Android Apps from Google Play Store’s come with malicious track-ware
Several Android Apps from Google Play Store’s come with malicious track-wareWe have known for quite a while that the Google play store is home to a huge number of malicious apps. These can range from those that collect your information for marketers, to those who...
EU Government Ask Streaming Content Companies to Reduce Quality
EU Government Ask Streaming Content Companies to Reduce Quality The internet infrastructure is undergoing a major stress test. With a majority of businesses under social distancing requirements, they had no choice but to have their employees work remotely from their...
Being Successful While Remote Working
Being Successful While Remote WorkingIf you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...
FCC Asked ISPs to “Keep Americans Connected Pledge” during Pandemic
FCC Asked ISPs to “Keep Americans Connected Pledge” during PandemicWith all the citizens being ordered to work at home by their employers the FCC has asked ISPs to waive late fees and refrain from disconnecting internet service during a 60 day period of social...
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection InformationCybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users. With the coronavirus acting as a pandemic and spreading...
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy. For 24 members of an Atlanta cybercrime gang involved in fraud and money...
For 60 days everyone gets unlimited data upgrade from Comcast and T-Mobile
For 60 days everyone gets unlimited data upgrade from Comcast and T-MobileWith everyone being sent home to work and school closing data usage is bound to rise. Internet providers are suspending their usage caps and overage fees for the next 60 days for all...
Security Must Be In Place Prior to Remote Work
Security Must Be In Place Prior to Remote Work One of the biggest problems facing companies during this coronavirus pandemic is that they do not have the proper and robust enough security to support remote-work. Many companies do not completely understand the...
Your Employer Says Go Home and Work — Now what?
Your Employer Says Go Home and Work --- Now what?For many companies and their employees, this widespread hysteria over this coronavirus pandemic has taken everyone by surprise. Remote work might have been a consideration but now is not an option but a requirement....
ILM uses high-tech LEDs and Game Engines to Bring Reality to The Mandalorian
ILM uses high-tech LEDs and Game Engines to Bring Reality to The MandalorianOne firm that makes use of some of the most advanced technologies to create the magic of movies is Industrial Light and Magic. To bring reality to the Mandalorian, they are using advanced...
Webex Communications Keep Businesses Operating During Quarantines
Webex Communications Keep Businesses Operating During Quarantines Seasonal Flu or a Covid-19 quarantine may sideline employees this year. To keep productivity up, you may need to conduct business remotely. One of the biggest challenges to remote work for companies is...
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay
Patch As Many As You Possibly Can and Keep The Bad Guys At BaySoftware updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...