Bots Losing Panache as Cybercriminals Hire In Third World

Bots Losing Panache as Cybercriminals Hire In Third World   As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption   Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories.  They simply take all our information and re-sell it making huge...
Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data   Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed.  Well, these under $20 devices can be connected in computers...
Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step   Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...