Connected Vehicle Applications: Android to the Un-Rescue
A new or newer car is a significant investment for most. As a rule of thumb most people don’t have the ability to write a check for one...
Downstream Impacts of NotPetya Hack on Small Businesses
Although cybersecurity experts believe that data was not stolen, nor the intent, of the late June, 2017 NotPetya cyberattack, many global...
Not Even the DoD is Secure!
Information security is constantly in the environment for the users and corporate systems. This affects consumers, business, government...
Small businesses can be impacted by internet-connected printer vulnerabilities
A resurgent threat is impacting enough businesses that the FBI distributed an alert. A Private Industry Notification (PIN) was issued by...
Non-Profits: Methods to Better Their Defensive Posture
Attackers have not been overly picky as to the selection of targets. The focus continues to be the money and data, specifically sensitive...
Yet Another App Hack
In recent years, the user 'experience' has been treated as having much more importance than security. This has been evidenced by the...
Encoding: Hello World
Start writing your post here. You can insert images and videos by clicking on the icons above. Encoding, in one form or another, has been...
Wiper malware can pose high risk for businesses that are data intense
A different variant of malware has been spreading in the last few months. What was first thought by some security experts to be a poorly...
Self-Signed Certificates: What Makes This an Issue
We have all come across this message.....ALERT! THE SITE'S SECURITY CERTIFICATE IS NOT TRUSTED! For a website to be secure, there needs...
Churches: Large and Small as Targets
As with so many other non-profits, churches likewise have been listed as a target for attackers. This issue has been exasperated due to...

