Why you shouldn’t connect to just any free Wi-Fi
Our friends at MalwareBytes put up a great blog post that explains in detail why you should not just connect to any free Wi-Fi. The risk is that you will connect to a hostile Wi-Fi access ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Our friends at MalwareBytes put up a great blog post that explains in detail why you should not just connect to any free Wi-Fi. The risk is that you will connect to a hostile Wi-Fi access ...
Ex-NSA contractor Edward Snowden used user names and passwords that colleagues at a spy base in Hawaii gave him to access some of the classified material he exfiltrated. Around 20-25 ...
Please read this article and then forward it to the head of your legal department or the person in your organization who is responsible for compliance. Recently, the Department of Health ...
By Steve Ragan , Staff Writer at CSO wrote: "October 22, 2013 — The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid ...
This week, MeriTalk, a public-private partnership focused on improving the outcomes of government IT, announced the results of a new report. The study compares what cyber security ...
Experts warn that cybercriminals are using fake Hong Kong Monetary Authority invoices to distribute a piece of malware. The emails are entitled “Invoice #3404196 – Remit File” and they ...
Softpedia published an article I have a problem with. There is so much wrong with this that I don't even know where to start. They started out with:
Last week Adobe announced probably the worst news ever for a tech company. Both their source code and customer lists had been stolen. EPIC FAIL!
Tomorrow, Tuesday October 1, 2013, the first stage of the new health care act kicks in. You can start shopping for policies on new insurance "marketplaces". There is going to be an ...
There is the expression that there are two kinds of companies. The ones that know they are hacked and the ones that don't. It's safe to assume your network has already been compromised ...
Check out a brand new 3:25 min Kevin Mitnick video where he shows live how an infected Word document allows a hacker to steal the employee's user name and password. This is just one of ...