The latest advance and paradigm shift which has been focused on is the application of AI to most walks of life. This will clearly change our way of life, culture, and motivation. Change has the tendency to bother people and its application to be problematic. People will worry, as it relates to AI, regarding several aspects. The grand, over-arching concern is AI taking over the world. This is a bit far-fetched and a stretch. There have been many other claims varying from milli
An aspect of human nature not explored sufficiently is the lack of memory permanence. There is the distinct length of time people remember major system compromises. After this point, the issues leading up to the compromise, implications for the company, effects for the clients and associates are forgotten. This is not a new phenomenon and has been verified by several retail business breaches. After the breach notification, the sales revenue decreases for a bit, however later
A staggering 59% of office workers have paid ransom on their company’s ransom attack at work. A recent study, by Intermedia, a cloud provider, surveyed 1,000 office workers. The office workers stated that 37% of the time the employer paid the ransom, but more frequently, the employee paid. Sadly, in 19% of the time, the data was not returned after the ransom was paid. Ransomware is big, big business. It is projected to cost companies over $5 billion globally. There is no indi
For malware to continue to be relevant in the market and being used in one form or another there has to be an aspect that continues to be a workable feature. If a piece of malware's signature is well-known by the AV producers, and easily red-flagged, there would not be a significant point for continued use. Emotet, a banking Trojan, has been in use since 2014. To ensure its continued use, the Trojan has not remained static. Over the years this has evolved in various aspects.
Uber, the ride sharing company, recently announced a massive data breach that occurred in 2016, but ignored notifying the victims. The breach occurred in October, 2016 and the then chief executive learned about the breach one month later, in November, 2016. The breach was not disclosed for over one year, until the new chief executive learned about it. In addition to ignoring state data breach notification laws, it seems Uber paid the cyber-criminal $100,000 to destroy the cop
Data comes in all forms and sizes. The composition of this also varies greatly dependent on the data owner. One actionable items regardless of the data composition is security. The data requires some form of security to be applied to it to keep unauthorized parties to access it. This difficult lesson has been learned by many organizations over the years with data compromises of differing magnitudes and costs to them. One of the latest involved the Department of Defense (DoD).
In recent history there have been rather extensive and significant breaches affecting millions of people. This action has provided criminals with a rather extensive amount of data to sell and resell on the darkweb. This has a rather substantial effect on the affected consumers. They have three options to deal with this. The consumers may do nothing and hope the criminals do absolutely nothing with the personal data. This is not the optimal situation and hardly could be recomm
Seemingly every year about this time, the phishing campaigns are presented to the consumers. The phishing emails have taken various forms to the consumers. There have been the emails from “shipping carriers” to several individuals stating their packages, all with the same tracking number, is out for delivery. “Vendors” forwarding emails with their new products you need to purchase for your friends and family as the perfect gifts are regularly encountered. These may be also ti