Tag Archives: threat

Ransomware / Data Sabotage – A Growing Threat

Michael Gregg has a new article out on Cyber-ransom that’s featured in the FBI’s Law Enforcement Bulletin. The article examines the growing risk of data sabotage. Ransomware is the perfect, digital weapon for a saboteur as it’s extremely destructive and … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware | Tagged , , , , , , | Leave a comment

How Data Brokers Threaten Your Privacy and Resell Your Information

Data brokers are buying, sharing and selling your information online.  While you have probably never heard of these companies…. they know all sorts of information about you and have most likely added you into a category such as: Financially Challenged, … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Privacy | Tagged , , , , , , , | Leave a comment

The US / Russian Simmering Cyberwar

Russia’s cyber assault on the US election is one of the most provocative acts we have seen against the US from a cyber prospective. It should be clear that cyberwar is an effective tool for Russia’s military and political goals. … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

Is Windows 10 Spying On You or Simply Building a Better User Experience?

Microsoft has come under fire from privacy advocates because many end-users feel that Window 10 is way too intrusive.  While it is true that much of this data is used to enhance user experience, Microsoft’s lack of transparency isn’t doing … Continue reading

Posted in Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , , | Leave a comment

Why Ethical Hackers Are In Strong Demand

Ethical hackers are in strong demand because modern cyber attacks can be highly focused, targeting your online assets and intellectual property. Especially in this BYOD (bring your own device) era, security breaches must be avoided. It’s like a hole in … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Grammar Undercuts Cyber Security When Using Long Computer Passwords

Certain long computer passwords may not provide as much cyber security as previously thought. A new study reports that passwords based on grammatical structure give away vital clues that make them more vulnerable to being cracked. Researchers at Carnegie Mellon … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Ramping up cyber security means shutting down Botnets

It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , | Leave a comment

Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)

Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment