Category Archives: Cyber security

MongoDB Hacks Lead to Many Data Breaches

MongoDB databases are being hit hard by cyber criminals. Older versions that don’s have adequate access control allows hackers to extract databases and demand a ransom. Without a backup many companies are being forced to pay up. Continue reading

Posted in Cyber security, IT and Computer Security, Privacy, Ransomware | Tagged , , , , , , , | Leave a comment

Ethical Hacking Reveals Holes In Cloud Security

When your virtual or cloud based network has security holes in it, if somebody doesn’t already know about it, it won’t belong before somebody does. Cloud based services are becoming a big target for cyber criminals. These criminals have the … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking | Tagged , , , , | Leave a comment

IRS Tax Scams to Watch Out For in 2017

Tax Season is here and that means it’s time to watch out for hackers, scammers, and criminals. Criminals will be targeting your tax return. Michael Gregg was interviewed by Fox News on the tax scams of 2017. Mr. Gregg warned … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , | Leave a comment

Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017

Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , , | Leave a comment

Snowden Movie Brings Issue of Personal Privacy to the Forefront

Michael Gregg appeared Friday, September 16th on The Fox Morning Show in Houston to talk about the risks to personal privacy that are now occurring because of technology and how these threats will become more advanced and widespread for the … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware, Smart Phone Hacking | Tagged , , , , , | Leave a comment

Ransomware / Data Sabotage – A Growing Threat

Michael Gregg has a new article out on Cyber-ransom that’s featured in the FBI’s Law Enforcement Bulletin. The article examines the growing risk of data sabotage. Ransomware is the perfect, digital weapon for a saboteur as it’s extremely destructive and … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware | Tagged , , , , , , | Leave a comment

How Data Brokers Threaten Your Privacy and Resell Your Information

Data brokers are buying, sharing and selling your information online.  While you have probably never heard of these companies…. they know all sorts of information about you and have most likely added you into a category such as: Financially Challenged, … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Privacy | Tagged , , , , , , , | Leave a comment

The US / Russian Simmering Cyberwar

Russia’s cyber assault on the US election is one of the most provocative acts we have seen against the US from a cyber prospective. It should be clear that cyberwar is an effective tool for Russia’s military and political goals. … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

Why Ethical Hackers Are In Strong Demand

Ethical hackers are in strong demand because modern cyber attacks can be highly focused, targeting your online assets and intellectual property. Especially in this BYOD (bring your own device) era, security breaches must be avoided. It’s like a hole in … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , | Leave a comment

The Prevalence of Cyber Crime

While many people acknowledge the prevalence of hacking and cyber crime, many, including businesses, do not take the necessary steps to ensure their cyber security. Even though there have been so many big cyber hacking cases exposed such as Target, … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment