BootStomp: Useful Tool in Researching Bootloaders
Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device is...
Lessons learned for small businesses from the Equifax data breach
Data on 143 million consumers was stolen from Equifax, which is estimated to be about 57% of all U.S. adults. The massive data breach was...
Bug Bounty Programs: Vehicle Specialty Often Difficult to Fill
The need for bug bounty programs began years ago as a void formed. The manufacturers were producing their goods and services, as to be...
Two Factor Authentication (2FA)
The attackers are generally on the prowl for new methods and attack points in order to better their opportunity to steal from the user....
Be Careful What You Share on Social Media
People are focused on posting their daily lives on the various social media sites. This may include vacation photos and updates, birthday...
Watch out for these new ransomware attacks
New ransomware and new variants of a previous ransomware are being observed by cyber security experts. The ransomware business is huge; a...
Phishing’s Latest Attack Message: Traffic Tickets
Phishing campaigns, unfortunately, have grown in prominence. There have been many successful attacks over the years. In order to continue...
Who is responsible when the smart city crashes?
Society is becoming ever-more connected on a daily basis. Consumers are able to check email from virtually anywhere, including the home,...
Real Estate Professionals are Increasing Targeted by Hackers
Real estate related cyber-crime is increased, according to cyber security experts. In many geographic markets, real estate inventory is...
IT Operations Have Adjusted Supply Chain Management
IT is intrinsically involved with every aspect of business. It would be difficult to imagine IT not being directly involved with updating...

