Top 15 Cyber Security Tips for Traveling
The holiday travel season provides numerous opportunities for hacking of your devices while your enjoy yourself with friends and family....
Recent Compromise and Ransomware: Delayed Response with Medical Office
With each compromise involving a medical office, there are repercussions on many fronts. The patients will have to work through having...
Twitter: Useful Tool for Machine Learning (ML)
Data is literally everywhere. This may seem as though this is solely a benefit, however at times there is too much as it abounds. The...
Bosch Dongle Issue: Vulnerability Remediated
Earlier this year, a vulnerability was discovered with the Bosch Drivelog. This was noted by the Argus Cyber Security Research. The...
Small business WordPress users need to update software now
A critical level vulnerability was identified by a security expert, causing WordPress to issue a new release for its software. All small...
Less Than Suitable Security Invites Issues to Law Firm
It has been noted repeatedly that the persons intent on compromising company systems are not completing this endeavor for practice. Given...
Please Stop using WEP: Lesson from the Field
Recently I had the pleasure of attending GrrCON, a regional InfoSec conference in Michigan. The venue, talks, vendors, etc. were...
Machine Learning to Assist with InfoSec
Computers are rather adept at a large number of tasks, from the mundane to complex and dangerous. The users may want statistics applied...
Free workshops by FBI on Devastating Business Email Compromise Threat
Business Email Compromise (BEC) attacks can be financially more damaging that ransomware, for small businesses. These attacks have...
Everything is a Target: Solar Panels are in Play
Alternative and renewable energy sources have become more important and visible over the last few years. This is due to many factors,...

