Machine Learning to Assist with InfoSec
Computers are rather adept at a large number of tasks, from the mundane to complex and dangerous. The users may want statistics applied...
Free workshops by FBI on Devastating Business Email Compromise Threat
Business Email Compromise (BEC) attacks can be financially more damaging that ransomware, for small businesses. These attacks have...
Everything is a Target: Solar Panels are in Play
Alternative and renewable energy sources have become more important and visible over the last few years. This is due to many factors,...
5 Top Resources for Small Businesses on National Cyber Security Month
October is full of special events and awareness programs. Some are tailored to be fun, like National Pizza Month and others are meant to...
Not to Silent Smart TVs
The number of connected devices has increased substantially in residences over the last five years. This makes people’s lives more...
Securing Hardware is not only a US Problem
Securing HaInsecure hardware is a massive issue for many parties. The insecure affects not only the individual or business as they use...
Medical Device Vulnerabilities: Medical Scanners Increase the Number of Vulnerable Equipment
Vulnerabilities with computer systems have been well-known in the industry over the years. The number and risk associated with these have...
October is Cybersecurity Month
For several years October has been deemed as cybersecurity awareness month. This has come about due to the realization by those with a...
Federal Trade Commission (FTC) and Lenovo: Superfish Epic Fail
Beginning in 2014, Lenovo began selling laptops with an app which was pre-loaded by Lenovo. The app compromised the laptop’s security and...
MacEwan University’s Epic Fail: Business Email Compromise (BEC) Claims Another Victim
There have been few attacks in the last five years that have been more success overall and on average than the phishing campaigns that...

