After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
1/10/2020
/ Assassinations ,
Computer Servers ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Databases ,
Email ,
Email Policies ,
Hackers ,
Infrastructure ,
Iran ,
Microsoft ,
Operating System Developers ,
Phishing Scams ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two-year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more
7/29/2019
/ Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Email ,
Hackers ,
Health Care Providers ,
Iran ,
Malware ,
Microsoft ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
UPS
The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange...more
4/1/2019
/ Authentication ,
Connected Items ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
Popular ,
Ransomware ,
Smart Devices
I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more
A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more
8/27/2018
/ Airspace ,
Banking Sector ,
Biometric Information ,
Biometric Information Privacy Act ,
Cell Phones ,
Commercial Use ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Drones ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Hackers ,
National Security ,
Popular ,
Ransomware ,
Risk Management ,
State and Local Government ,
State Departments of Transportation ,
Unmanned Aircraft Systems
With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more
10/27/2015
/ Android ,
Cell Phones ,
Data Privacy ,
Data Security ,
Encryption ,
Google ,
iPhone ,
Mobile Devices ,
OEM ,
Popular ,
Smartphones ,
Wireless Devices ,
Wireless Industry ,
Wireless Technology