May 29, 2018
Scareware: A Silent Form of Hacking

It can happen to anyone, any time. A user are browsing on the internet, for work or for pleasure, when suddenly a box pops up. A virus has infected your computer and call the support number immediately. Scareware has just attacked you. The box can include anything from the browser logo to the logo of […]

Read More
April 3, 2018
Private Data: Are You At Risk?

Several days ago, the New York Times printed an article regarding Amazon and Google’s applications for new patents. The patents hint at an ability to listen to more of the home environment via their respective virtual assistant (VA) devices. Both companies have transparent policies and repeat often they do not sell or advertise based on […]

Read More
March 6, 2018
Thanatos: Newest Ransomware To Combat

As the world becomes more connected via IoT devices and smart phones, the ability of viruses to spread increases as well. Enterprises no longer have only desktop computers to worry about. Frequent use of company devices for personal activities expose a company to risk of ransomware. Malware is a generalized umbrella term for any malicious […]

Read More
December 5, 2017
Blockchain: Can It Secure IoT Technology?

The last two weeks Bitcoin has repeatedly made news, breaking limits of value unexpected in traditional financial sectors. Though Bitcoin and other cryptocurrencies are making news, it’s the underlying technology that offers the most reward to businesses. Namely, blockchain technology. Last month we discussed the encroaching issues with the ever expanding IoT world in which […]

Read More
November 28, 2017
Smartphones: What Is Your Phone Seeing?

In a group of 5 individuals, there is likely a minimum of 6 smartphones. Given the advent of businesses supplying phones for work, and individuals carrying personal smartphones, mobile devices outnumber individuals in a growing trend. While this seems the norm for any Western society, having so many mobile devices can be a large risk […]

Read More
October 24, 2017
Botnets and IoT Devices: Your Business Is at Risk

Last year there was an attack on Dyn, an internet infrastructure company, that caused widespread blackouts in company websites and internet access. The botnet found responsible is an open code malware named Mirai that had approximately 100,000 devices flood Dyn’s servers. The DDos attack was the largest to date in internet history. While Dyn neutralized […]

Read More
September 19, 2017
Security: Is Mobility Ahead of Its Time?

Apple announced last week that iPhone X, scheduled to be shipped in November, will contain facial recognition security. Samsung Galaxy 8 has the technology already residing in its new OS Oreo. While most tech people are in a flurry regarding whether facial recognition is an invasion of privacy or the newest leap forward, a larger […]

Read More
August 1, 2017
Why Security of IoT Is Necessary

Recently we discussed Alexa, IoT, and the amount of information being shared on the internet via mobile devices and apps. There is a large risk to these interconnected devices, despite the efficiencies and marketing information provided. As we mentioned last week, devices connecting to the internet can be hacked. DEF CON DEF CON is one […]

Read More