Subscribe

Ransomware Attacks North Carolina and Connecticut


Posted October 30, 2018 in Malware, Cryptocurrency, Digital Forensics, Ransomware, Bitcoin

The city of West Haven, Connecticut was hit by a ransomware attack that ran for twenty-three minutes on Tuesday,...

Five Best Practices for IT Security


Posted October 25, 2018 in Data Breach, Malware, Cloud Security

Security is a necessity when it comes to information technology. Everything from hacking to malware to theft is a...

One Simple Trick to Boost Your Security that Nobody Does


Posted October 24, 2018 in Malware, Data Breach, Cloud Security

Cybercrime is projected to cost the global economy more than $2 trillion a year by 2019 according to market analysts...

Välkommen! Now Give Me Your Hand: The Potential Of Implanted Microchips


Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach

Biohax, a passive near field communications device has been inserted in thousands of people in Sweeden.  Certified...

Chinese Spy Chips Found on US Servers


Posted October 5, 2018 in Data Breach, Malware, Cloud Security

This is something I've been contemplating for a good 20 years. I hate to see my suspicions borne out. As it turns...

Unsecured Webcams Leave Open Door for Criminals

Unsecured Webcams Leave Open Door for Criminals


Posted October 4, 2018 in Data Breach, Work from Home, Malware

Security expert Craig Petronella of Petronella Technology Group said you shouldn’t just take a camera...

Hurricane Preparedness Checklist


Posted September 11, 2018 in Data Breach, Cloud Security, Malware

The biggest concern with the looming storm with regards to electrical equipment is flooding. The simplest way to...

How to stop your smart home from being hijacked

How to stop your smart home from being hijacked


Posted September 6, 2018 in Malware, Data Breach, AI

Your home internet connection could be leaving you vulnerable to an attack from criminals. The internet connection...