Cybersecurity and Linux SSH Servers
Linux SSH Servers as Viable Targets Charles Parker, II Cybersecurity is such an interesting field. Just when you have the vulnerabilities...
Cybersecurity...New Device, Old Problems
New Devices, Old Problems by Charles Parker, II Technology is a wonderful thing. This has advanced our society, way of life, and...
Cybersecurity and Vendors
No business is an island. At times, they require outside services from vendors to complete their mission. An organization, as a rule of...
Cybersecurity and the Automobile Industry
In the metro-Detroit area, the primary industry and revenue force is the auto industry. This is clear due to the number and concentration...
Cybersecurity and Phishing Lines
Phishing is widely used by many different attackers against their targets. This has historically been a very profitable attack vector....
Cybersecurity and USBs
You would be hard pressed to find a person who has not in the least seen a USB. Most people have probably used a USB with their phones,...
Cybersecurity and Printer Security
A new printer comes with so many fabulous features. It is like a mini-computer into itself. And there lies a problem. Like a...
Cybersecurity and Critical Infrastructure revisited
Critical infrastructure (CI) is one of the underlying backbones of our civilization. This aspect supports virtually all we are actively...
Cybersecurity and Smart Phones
Overall, there are two primary smartphone forms-the iPhone and Android. Of the two, the Android phones have been targeted at a much...
Cybersecurity and Ransomware
In recent years, hospitals and medical offices have been increasingly targeted by attackers. This trend will continue this year and well...

