Mirai Botnet: A Sign of DDoS to Come
Attackers are always looking for new and novel methods of attack. These initially may be difficult to defend against, as these were new...
New Attack with Seldom Used Vector: PowerSniff
Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for personal profit,...
Employee data sharing is still a cybersecurity weak link at small businesses
The statistics from a recent survey tell us businesses still have a challenge with cybersecurity behavior of their employees. Dell...
Tesco Bank: Oversight
And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as much. The Swift...
iPhone Hack: One More Vulnerability
When it is time for an upgrade or when the user simply wants a new phone, they arrive at their retailer and ask a few questions. The...
PDFs: Still be wary
Phishing is no different than other attack methodologies. These evolve over time. Initially the attack may be a bit unsophisticated and...
Insider Threats: Roots and Remediation
Insider Threats: Roots and Remediation Charles Parker, II In 2015, nearly half of the federal agencies responding to a survey indicated...
Select small business audiences need focused cybersecurity training
Now that everyone in your company has participated in basic cybersecurity awareness training and your IT people have done several...
Tax time frauds can harm small businesses
Tax filing due date for individuals is April 18th this year, which is soon approaching. The IRS recently alerted taxpayers to be...
Think Twice Prior to Connecting Your Smartphone to Your Vehicle
Most people are affected by connected vehicles in some form or another. This may take the form of the user driving their car to the...

