Category Archives: IT and Computer Security

IRS Tax Scams to Watch Out For in 2017

Tax Season is here and that means it’s time to watch out for hackers, scammers, and criminals. Criminals will be targeting your tax return. Michael Gregg was interviewed by Fox News on the tax scams of 2017. Mr. Gregg warned … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , | Leave a comment

Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017

Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , , | Leave a comment

How Data Brokers Threaten Your Privacy and Resell Your Information

Data brokers are buying, sharing and selling your information online.  While you have probably never heard of these companies…. they know all sorts of information about you and have most likely added you into a category such as: Financially Challenged, … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Privacy | Tagged , , , , , , , | Leave a comment

The US / Russian Simmering Cyberwar

Russia’s cyber assault on the US election is one of the most provocative acts we have seen against the US from a cyber prospective. It should be clear that cyberwar is an effective tool for Russia’s military and political goals. … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

Is Windows 10 Spying On You or Simply Building a Better User Experience?

Microsoft has come under fire from privacy advocates because many end-users feel that Window 10 is way too intrusive.  While it is true that much of this data is used to enhance user experience, Microsoft’s lack of transparency isn’t doing … Continue reading

Posted in Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , , | Leave a comment

The CISSP Exam Update and Eight Domain Rewrite for 2015

For individuals considering the (ISC)² CISSP exam, you need to be aware of a major update that will go into effect April 1, 2015.  Gone are the ten domains that have been with us for many years. Here are the … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Research Shows Businesses are Prime Targets for Cybercrime

High profile security breaches such as Target, Snapchat, and Neiman Marcus often make headlines. However, research shows that both large and small businesses are targets of cybercrime. Verizon published a data breach investigations report that looked at 621 confirmed incidents … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

Everyone Needs to be Responsible for Cyber Security

The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 2)

In our last article, we talked about how having a social media account can leave you exposed to potential hacks from cybercriminals who are looking to take advantage of your friends and followers for scams and spam. Now, let’s examine how the material you post online can be used against you by these same cybercriminals. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment