Tag Archives: malware

MongoDB Hacks Lead to Many Data Breaches

MongoDB databases are being hit hard by cyber criminals. Older versions that don’s have adequate access control allows hackers to extract databases and demand a ransom. Without a backup many companies are being forced to pay up. Continue reading

Posted in Cyber security, IT and Computer Security, Privacy, Ransomware | Tagged , , , , , , , | Leave a comment

IRS Tax Scams to Watch Out For in 2017

Tax Season is here and that means it’s time to watch out for hackers, scammers, and criminals. Criminals will be targeting your tax return. Michael Gregg was interviewed by Fox News on the tax scams of 2017. Mr. Gregg warned … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , | Leave a comment

Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017

Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , , | Leave a comment

Snowden Movie Brings Issue of Personal Privacy to the Forefront

Michael Gregg appeared Friday, September 16th on The Fox Morning Show in Houston to talk about the risks to personal privacy that are now occurring because of technology and how these threats will become more advanced and widespread for the … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware, Smart Phone Hacking | Tagged , , , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Everyone Needs to be Responsible for Cyber Security

The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , , , | Leave a comment

Ramping up cyber security means shutting down Botnets

It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , | Leave a comment

Will 2013 Be Like 2012?

Here is a look back at some of the top predictions of the security issues for 2012 and what they may portend for the year to come. Continue reading

Posted in Cyber security, IT and Computer Security | Tagged , , , , , | Leave a comment

Ethical Hacking is Used to Beat Cyber Criminals

The theft of customer data that is used by hackers for financial gain requires companies to ensure their data is protected. This is done using ethical hacking that tests the security of current IT infrastructure. The ethical hacking of your … Continue reading

Posted in Cyber security, Ethical Hacking | Tagged , , , , , | Leave a comment

Identify IT Vulnerabilities with a Security Assessment

The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment