• HOME

  • ABOUT

  • SOLUTIONS

  • PAPERS AND PUBLICATIONS

  • CONTACT

  • Blog

  • More

    washingtoncybercenter.com

    © 2023 by Marketing Solutions. Proudly created with Wix.com

    Phishing: It’s Not What’s for Dinner

    April 30, 2018

    |

    Charles Parker, II

    Phishing has been in use in one form or another probably a week after the first email account was used by consumers. Phishing has become glaringly prevalent in today’s society. This clogs up the Spam folders daily across the U.S. The attackers have operationalized phis...

    Read More

    Please stop using the business centers in the hotels

    April 27, 2018

    |

    Charles Parker, II

    As noted previously, I had the pleasure of attending GrrCON, the InfoSec conference in Grand

    Rapids, Michigan. The event was a complete pleasure to attend with the talks, vendors, and

    others involved. As this is a bit away from my residence, there was a need for me to st...

    Read More

    Gorilla Glue Compromise: Data Not Glued Down

    April 23, 2018

    |

    Charles Parker, II

    Gorilla Glue is known for their excellent set of products, and also their commercials. What has not been overly publicized, naturally, is the compromise from last year. The attack was spearheaded by The Dark Overlord. The hackers had previously attacked medical organiz...

    Read More

    MinerEye: Another Security Tool with a Twist

    April 20, 2018

    |

    Charles Parker, II

    With regularity, new InfoSec tools are presented for the market to try and see if there is applicable use. A portion of these are open-source, others are freemium (free for the basic tool with an upcharge for the entirety of the functions), and others are for sale at t...

    Read More

    Verizon’s 2018 DBIR

    April 16, 2018

    |

    Carolyn Schrader

    Verizon recently released its 11th edition of its Data Breach Investigations Report (DBIR). Worldwide, malware incidents declined in 2017. The volume is still significant and attacks are lucrative for cyber-criminals. The report identified 53,308 security incidents and...

    Read More

    Twitter: Useful Tool for Machine Learning (ML)

    April 13, 2018

    |

    Charles Parker, II

    Data is literally everywhere. This may seem as though this is solely a benefit, however at

    times there is too much as it abounds. The vast amount, when attempted to analyze, may make it

    difficult to understand what is really there and how it may be useful. Whether resear...

    Read More

    Recent Compromise and Ransomware: Delayed Response with Medical Office

    April 9, 2018

    |

    Charles Parker, II

    With each compromise involving a medical office, there are repercussions on many fronts. The patients have to work through having their private information strewn across the darkweb for years, the office may have HIPAA issues manifesting in expensive fines and operatio...

    Read More

    Still check the autofill: This will save you an apology

    April 6, 2018

    |

    Charles Parker, II

    Too many applications are focused on convenience for the users over any other factor. This increases, in theory, productivity and the number of systems using the app. One of these options is the autofill. This has been noted and used by most users in one app or another...

    Read More

    Not a good steward: DHS with multiple vulnerabilities

    April 2, 2018

    |

    Charles Parker, II

    The national government is entrusted with many aspects of our lives. The law enforcement departments are tasked with applying the laws to our daily lives and relationships. The Department of Defense (DoD) is responsible for defending the US. The Department of the Inter...

    Read More
    Please reload

    Cybersecurity, the Holiday Season and the Grinch

    December 6, 2019

    Cybersecurity, Vendors and Stolen Laptops

    December 2, 2019

    Cybersecurity and Dental Services

    November 29, 2019

    Cybersecurity and IT Firms

    November 25, 2019

    Cybersecurity and Small Town Attacks

    November 22, 2019

    Cybersecurity and Online Gaming

    November 18, 2019

    Cybersecurity, Backup Services and Ransomware

    November 15, 2019

    Cybersecurity, PLCs and DoS

    November 4, 2019

    Cybersecurity and Student Loans

    November 1, 2019

    Cybersecurity, Automobiles and Inverter Issues

    October 28, 2019

    Please reload

    Recent Posts
    Archive

    December 2019 (2)

    November 2019 (7)

    October 2019 (7)

    September 2019 (9)

    August 2019 (10)

    July 2019 (8)

    June 2019 (9)

    May 2019 (10)

    April 2019 (9)

    March 2019 (10)

    February 2019 (8)

    January 2019 (9)

    December 2018 (8)

    November 2018 (9)

    October 2018 (9)

    September 2018 (7)

    August 2018 (9)

    July 2018 (9)

    June 2018 (11)

    May 2018 (6)

    April 2018 (9)

    March 2018 (9)

    February 2018 (8)

    January 2018 (6)

    December 2017 (8)

    November 2017 (7)

    October 2017 (10)

    September 2017 (9)

    August 2017 (10)

    July 2017 (8)

    June 2017 (10)

    May 2017 (8)

    April 2017 (7)

    March 2017 (8)

    February 2017 (7)

    January 2017 (8)

    December 2016 (11)

    November 2016 (14)

    October 2016 (14)

    September 2016 (8)

    August 2016 (1)

    July 2016 (1)

    June 2016 (1)

    Please reload