Israeli Company’s Spyware Used to Hack US Citizens. FBI Now Involved.
Israeli Company’s Spyware Used to Hack US Citizens. FBI Now Involved.US Companies and Citizens may have had their information compromised by the Israeli company, NSO Group through their smartphone-based surveillance software utilized to gather intelligence. According...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel
"Evil Corp" really does exist, and it’s distributing malware using Microsoft ExcelYes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft's popular spreadsheet package, Excel, so that it can carry its malware...
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Our Personal and Brand Reputations are At-Risk By Nation-States
Our Personal and Brand Reputations are At-Risk By Nation-StatesNation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Do You Use Trello? Search turns up massive trove of private data
Do You Use Trello? Search turns up massive trove of private dataDo you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...
Most Businesses Attacked By Business Email Compromise Last Year
Most Businesses Attacked By Business Email Compromise Last Year2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Keeping Legacy Software Safe
Keeping Legacy Software SafeThe primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses
Downtime and Costs Double as Ransomware Attacks Hit Larger BusinessesNew and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities. This deep pocket targets are driving the costs up by...