iPhone Hack: One More Vulnerability
When it is time for an upgrade or when the user simply wants a new phone, they arrive at their retailer and ask a few questions. The...
PDFs: Still be wary
Phishing is no different than other attack methodologies. These evolve over time. Initially the attack may be a bit unsophisticated and...
Insider Threats: Roots and Remediation
Insider Threats: Roots and Remediation Charles Parker, II In 2015, nearly half of the federal agencies responding to a survey indicated...
Select small business audiences need focused cybersecurity training
Now that everyone in your company has participated in basic cybersecurity awareness training and your IT people have done several...
Tax time frauds can harm small businesses
Tax filing due date for individuals is April 18th this year, which is soon approaching. The IRS recently alerted taxpayers to be...
Think Twice Prior to Connecting Your Smartphone to Your Vehicle
Most people are affected by connected vehicles in some form or another. This may take the form of the user driving their car to the...
Lessons Learned from Yahoo breach for Small Businesses
How the hack began According to FBI news, the hack began with a straight forward spear-phishing scam. It took only one employee to click...
Mac and Skype: Intersection Provides for a Backdoor
Skype is a well-used and accepted application used to communicate, for consumers and commercial purposed, with a combined auditory and...
USB Kill: Yet One More Item to be Concerned With
There are constantly new attacks on various pieces of equipment, both consumer and commercial. With so many vulnerabilities and such a...
UK Hospitals ALSO Victims of Malware
Attackers have a single focus in many of these cases. This may be to embarrass the entity, have the accounting department urgently wire...

