Xiny: Yet Another Android Trojan
Xiny is not new malware for the community. This was first noted in March 2015 (Dr. Web, 2016). Since this time the malware has received...
Hurricane Matthew a Reminder to Us All
This past week Hurricane Matthew roared along the east coast of the US wreaking havoc across numerous southeastern states. Despite the...
Small businesses should practice 3-2-1 back-ups to help combat ransomware
The likelihood of a business being a ransomware victim is significantly greater today than it was a year ago. According to a study by...
Insider Threats - A Growing Concern
The insider threat risk has never been larger and carried more concern than now. A few years ago a stock trading algorithm was liberated...
House Passes Improving Small Business Cyber Security Act of 2016
A bill introduced to the House of Representatives in April, 2016 is intended to help small businesses gain access to cybersecurity...
Threat Management: Internal & External
Threats to the enterprise abound from many different avenues. There basically is no limit as to where the threat may be directed from. A...
We visit MAD once again...
There was a phrase used back in the Cold War called MAD....Mutual Assured Destruction. Essentially it meant that no matter what the...
Vehicle Hacking: Beyond Proof of Concept & Applied!
In the overall scheme of our reality, vehicle hacking is relatively a new area of research. This timeline was in place due to advances in...
Yahoo Hacked!
According to news reports today, Yahoo suffered a major breach in 2014 that may have exposed as many as 500 million accounts to...
The Mac Attack Continues: Keydnap Arises
Not so long ago, Apple products were virtually immune from malware and other attacks. This was due to a number of factors, two of which...

