Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Pamela GUPTA

President at OutSecure Inc

Easton, United States

Global AI Risk, CyberSecurity Privacy Executive
-Founder Member of IoT Security Foundation, an industry consortium of global IoT leaders,
-Founder WiCyS Trusted AI Affiliate; group “Advancing Trust in AI” for building Trusted, Secure and Ethical AI systems.
-Contributor to global CISO program at Center for Internet Security
-Co-Chair at NIST GCTC Smart Cities Cybersecurity & Privacy Advisory Council
-Task force leader for NIST GCTC COVID-19.
-Creator of Transparency Integrity Privacy Security, AI TIPS © Framework for AI Governance

Available For: Advising, Consulting, Influencing, Speaking
Travels From: ct
Speaking Topics: AI Cybersecurity and Risk Governance, AI Trust, AI Voice Security, AI NLP Security

Speaking Fee $1,000 (In-Person)

Pamela GUPTA Points
Academic 0
Author 401
Influencer 146
Speaker 0
Entrepreneur 0
Total 547

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Service Provider
Business Unit: AI, Cybersecurity Risk Management
Theatre: USA
Media Experience: 15 years
Last Media Interview: 11/05/2021

Areas of Expertise

AI 30.92
Autonomous Vehicles
Business Continuity
Business Strategy 30.12
Cloud
COVID19
Cybersecurity 47.81
Digital Twins
Emerging Technology
IoT
Leadership
Management
Mergers and Acquisitions
Privacy 44.99
Quantum Computing
Risk Management 66.99
RPA
Security 63.94
Smart Cities
Startups
Supply Chain
Big Data 32.27
Innovation 30.09
NFT

Industry Experience

Financial Services & Banking
Healthcare
Hospitality
Manufacturing
Media
Pharmaceuticals
Professional Services

Publications

359 Article/Blogs
Microsoft Exchange Server Antivirus Exclusions
Import from wordpress feed
March 10, 2023
The Microsoft Exchange Server is an e-mail server developed exclusively for Windows OS users. It also offers collaboration functions like scheduling and calendaring. One of the Exchange Server’s biggest draws is its ...

See publication

Tags: Privacy, Risk Management, Security

S1deload Stealer Malware
Import from wordpress feed
March 09, 2023
A new malware campaign on Facebook and YouTube is making headlines. S1deload Stealer hijacks these social media accounts, mines cryptocurrency, and spreads itself. Discover what business owners need to know about this ...

See publication

Tags: Privacy, Risk Management, Security

Stanford University Data Breach
Import from wordpress feed
March 08, 2023
The recent Stanford University data breach is causing businesses to reevaluate their security practices. The way the university handled the breach can serve as a guide for business owners. But it is ...

See publication

Tags: Privacy, Risk Management, Security

LastPass Reveals Details of Attack
Import from wordpress feed
March 07, 2023
LastPass recently revealed more details of the second malware attack targeting its infrastructure.It also disclosed the company’s actions to prevent similar attacks in the future. By learning more about the attack, business ...

See publication

Tags: Privacy, Risk Management, Security

GoDaddy Finds Multiple-Year Security Breach
Import from wordpress feed
March 06, 2023
GoDaddy is a popular web hosting company with millions of customers worldwide. Users are alarmed to find that attackers stole the company’s source code. The hosting giant found the security breach in ...

See publication

Tags: Privacy, Risk Management, Security

Serious Security Flaw in Cisco ClamAV Discovered
Import from wordpress feed
March 04, 2023
It is ironic when software designed to protect is vulnerable to threats. That is the case here. Experts discovered the ClamAV free anti-malware program has a serious security risk. Investigations revealed the ...

See publication

Tags: Privacy, Risk Management, Security

Everything You Need to Know About the Pepsi Data Breach
Import from wordpress feed
March 03, 2023
Hackers need less than a minute to perform a successful data breach. It will be over before you can even finish your cup of coffee. Unfortunately, it can take companies several weeks ...

See publication

Tags: Privacy, Risk Management, Security

Cloudflare Successfully Detects and Mitigates Largest DDoS Attack Recorded
Import from wordpress feed
March 02, 2023
During the weekend of Feb. 11-12, 2023, content delivery network provider Cloudflare detected and mitigated an unusually high number of hyper-volumetric DDoS attacks. It did not disclose the targets but mentioned some ...

See publication

Tags: Privacy, Risk Management, Security

Internet Explorer Gets Disabled From Windows 10
Import from wordpress feed
March 01, 2023
Microsoft has intended to replace Internet Explorer with the new Edge browser. On June 15, 2022, the company officially retired the popular browser by ending its update support for the application. However, ...

See publication

Tags: Privacy, Risk Management, Security

State of Emergency Declared in Oakland to Combat Ransomware Attack
Import from wordpress feed
February 28, 2023
On Feb. 8, 2023, the City of Oakland suffered a ransomware attack. It forced several city systems to go offline. Fortunately, it did not affect emergency services. 911 and fire rescue were ...

See publication

Tags: Privacy, Risk Management, Security

Microsoft Announces End Date for Exchange Server 2013
Import from wordpress feed
February 27, 2023
Microsoft Exchange Server 2013 will no longer receive updates starting April 11, 2023. That gives companies using the system to upgrade to a newer one or lose support. It will no longer ...

See publication

Tags: Privacy, Risk Management, Security

Measure the Success of Your Social Media Strategy
Import from wordpress feed
February 25, 2023
It doesn’t matter how creative or well-thought-out your social media marketing strategy is. All the hard work you put into it will be for nothing if you don’t measure its performance. It’s ...

See publication

Tags: Privacy, Risk Management, Security

Over 3 Million Patients Affected in California Hospital Ransomware Attack
Import from wordpress feed
February 24, 2023
A ransomware attack exposed the information of more than 3.3 million patients on Dec. 1, 2022. Multiple medical groups are affected under the Heritage Provider Network in California. These are: Lakeside Medical ...

See publication

Tags: Privacy, Risk Management, Security

AWS Warns Against Malvertising Targeting Users
Import from wordpress feed
February 23, 2023
Cybersecurity company Sentinel Labs has discovered a new malvertising campaign targeting AWS users. Sentinel Labs warns that cybercriminals have established a campaign on Google Ads programs that take users to a fake ...

See publication

Tags: Privacy, Risk Management, Security

Why Network Security Is More Important Than Ever
Import from wordpress feed
February 22, 2023
Modern businesses rely on computers and the internet to perform their daily operations. An example is the use of emails, which is essential for client and internal communications. Companies also collect data ...

See publication

Tags: Privacy, Risk Management, Security

Microsoft Edge Renders Using Adobe Acrobat
Import from wordpress feed
February 21, 2023
Adobe and Microsoft announced on Feb. 8, 2023, a collaboration to transform the PDF reading experience by bringing Acrobat to Edge. They aim to provide stronger security and improved performance through the ...

See publication

Tags: Privacy, Risk Management, Security

Reddit Cybersecurity Incident
Import from wordpress feed
February 20, 2023
Reddit, a popular social news site, disclosed that it was hacked on Sunday night (pacific time). The company announced on February 9th in a posting that they first became aware of the ...

See publication

Tags: Privacy, Risk Management, Security

Search Engine Yandex Suffers Massive Leak
Import from wordpress feed
February 18, 2023
Russian search engine Yandex offers a slew of online services to replace Google, Netflix, Spotify, Amazon, and Uber. However, a recent Yandex data leak contains nearly 50 gigabytes of data with leaked ...

See publication

Tags: Privacy, Risk Management, Security

Microsoft Teams Free (Classic) Is Retiring
Import from wordpress feed
February 17, 2023
Microsoft has decided to retire its MS Teams Free (classic) app. Released in 2017, MS Teams is a communication platform where users chat and call each other over the internet. While the ...

See publication

Tags: Privacy, Risk Management, Security

Schools in Arizona and Massachusetts Most Recent Victims of Cyberattacks
Import from wordpress feed
February 16, 2023
Schools in Tucson, AZ, and Nantucket, MA, became the most recent targets of cyberattacks within hours of each other during the last week of January. The two attacks appear to be unrelated. ...

See publication

Tags: Privacy, Risk Management, Security

Recent T-Mobile Data Breach Affects Google Fi Customers
Import from wordpress feed
February 15, 2023
Google Fi users have received emails regarding a recent data breach at T-Mobile. From November 2022 through January 2023, hackers were able to obtain unauthorized access to data for 37 million T-Mobile ...

See publication

Tags: Privacy, Risk Management, Security

Prilex Malware Blocks Contactless Payments to Steal Credit Card Information
OutSecure
February 14, 2023
The hackers behind Prilex PoS (point-of-sale) malware have developed a new way to steal credit card information to target customers using contactless or “tap-to-pay” payments.

See publication

Tags: Privacy, Risk Management, Security

The Importance of Cybersecurity for Small Businesses
Import from wordpress feed
February 13, 2023
Cyberattacks are a growing threat to companies of all sizes. Unfortunately, small and medium businesses are particularly vulnerable due to their limited resources or lack of vital security measures. Like most companies, ...

See publication

Tags: Privacy, Risk Management, Security

Human AI Collaboration: Why it matters
LinkedIn
February 13, 2023
Harvard Business Review reports firms achieve the most significant performance improvements when humans and machines work together. Through such collaborative intelligence, humans and AI actively enhance each other’s complementary strengths: the leadership, teamwork, creativity, and social skills of the former, and the speed, scalability, and quantitative capabilities of the latter.

See publication

Tags: Cybersecurity, Risk Management, Security

Maximizing Productivity: Tools and Strategies for Small Business Owners
Import from wordpress feed
February 11, 2023
Maximizing productivity is key to maintaining competitiveness as a small IT business owner. Being successful and efficient with your time and energy is crucial when you have a never-ending to-do list and ...

See publication

Tags: Privacy, Risk Management, Security

Four Ways to Protect Your Business Network
Import from wordpress feed
February 10, 2023
Wi-Fi is an easy and popular way to connect to the internet. However, it can also be easily hacked and used to steal your sensitive information. This article will explain some top ...

See publication

Tags: Privacy, Risk Management, Security

Small Business, Big Target: 5 Ways to Protect Your Company from Cyber Attacks
Import from wordpress feed
February 09, 2023
As a small business owner, you might believe that cyberattacks are unlikely to affect your organization. However, due to their sometimes lower resource levels and less advanced security procedures, small enterprises are ...

See publication

Tags: Privacy, Risk Management, Security

5 Ways Managed IT Services Can Benefit Your Business
Import from wordpress feed
February 08, 2023
Companies may benefit from a variety of services that a managed IT provider can offer, including higher productivity, cost savings, enhanced cybersecurity, and access to professional advice. These services can aid businesses ...

See publication

Tags: Privacy, Risk Management, Security

How to Use Technology to Streamline Your IT Operations
Import from wordpress feed
February 07, 2023
As a business owner, you realize the necessity of being competitive in a rapidly evolving industry. One method is to use technology to simplify your operations. The proper strategies and tools can ...

See publication

Tags: Privacy, Risk Management, Security

Maximizing the Value of Your Business’s IT Assets
Import from wordpress feed
February 06, 2023
In this digital age, effective management of IT assets and inventory is essential to running a successful business. Knowing what assets are available for use and keeping an organized inventory list can ...

See publication

Tags: Privacy, Risk Management, Security

Efficiency is Key: How Automation Can Benefit Your Small Business
Import from wordpress feed
February 04, 2023
Businesses have become increasingly competitive in the digital age, and innovative entrepreneurs have taken steps to give their companies an edge. One increasingly popular way of staying competitive is to utilize automation ...

See publication

Tags: Privacy, Risk Management, Security

The Power of Social Media for Businesses
Import from wordpress feed
February 03, 2023
Businesses can significantly benefit from utilizing social media as a marketing tool. With billions of people using social media worldwide, it presents a unique opportunity to reach potential customers and grow your ...

See publication

Tags: Privacy, Risk Management, Security

Effective Collaboration in the Digital Age: Strategies for Remote Teams
Import from wordpress feed
February 02, 2023
Technology has drastically changed the way people work. With the rise in remote jobs and teams, workers need to collaborate and communicate effectively, even in different time zones and countries. Working productively ...

See publication

Tags: Privacy, Risk Management, Security

The Advantages of Using a CRM for Lead Generation and Nurturing
Import from wordpress feed
February 01, 2023
There are several ways a business can enhance and optimize its operations. A customer relationship management (CRM) system is one technology that may considerably assist your organization. A CRM system is software ...

See publication

Tags: Privacy, Risk Management, Security

Top Benefits of Email Marketing for IT Companies
Import from wordpress feed
January 31, 2023
Email marketing is a highly successful strategy for small IT companies, giving a variety of advantages that may assist in increasing customer interaction, brand exposure, and lead generation. Here are some of ...

See publication

Tags: Privacy, Risk Management, Security

Preparing for the End of Windows 10
Import from wordpress feed
January 30, 2023
Business owners worldwide have adopted Windows 10, one of Microsoft’s most popular operating systems. However, Microsoft will cease offering digital downloads of Windows 10 on January 31, 2023. The discontinuation of Windows ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

The Benefits of a VPN for Your Business
Import from wordpress feed
January 28, 2023
VPNs, or virtual private networks, have grown in popularity recently as more people recognize the need for internet privacy and security. A VPN is a software that encrypts your internet connection, making ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Advantages of a Hybrid Cloud
Import from wordpress feed
January 27, 2023
Public and private cloud infrastructures have benefits and drawbacks that can impact small to medium-sized businesses. Some advantages of public cloud infrastructure include lower costs, scalability, and flexibility. However, public clouds also ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Data Breach at GoTo: Encrypted Customer Information Compromised
Import from wordpress feed
January 26, 2023
On January 23, 2023, GoTo released a statement detailing an update to the ongoing data breach investigation. Business owners should pay attention to this incident and its implications for their security practices. ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

PayPal Hack: 35,000 Accounts Compromised in Credential Stuffing Attack
Import from wordpress feed
January 25, 2023
On December 20, 2022, PayPal, one of the most widely used online payment platforms, confirmed that 35,000 users’ accounts had been compromised due to a security breach. An unauthorized party viewed and ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Maximizing Productivity with Managed IT Services
Import from wordpress feed
January 24, 2023
Businesses seeking to improve productivity and minimize disruptions caused by IT issues can benefit from managed IT services. A managed service provider (MSP) can provide businesses with the expertise to maintain and ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

T-Mobile Data Breach Impacts Millions
Import from wordpress feed
January 23, 2023
The mobile phone provider recently announced that a data breach had impacted 37 million T-Mobile accounts. In a Form 8-K filing with the US Securities and Exchange Commission, T-Mobile said they realized ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

The Top 3 Benefits of Outsourcing IT Support
Import from wordpress feed
January 21, 2023
Businesses of all sizes can benefit from outsourcing IT support because of the accessibility to specialized knowledge, cost reductions, and operational flexibility. Some top benefits of outsourcing IT support include financial savings, ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Don’t Let Outdated Operating Systems Put Your Business at Risk
Import from wordpress feed
January 20, 2023
As the New Year begins, business owners need to be aware of a significant change in the technology landscape: the end of Microsoft’s support for Windows 7 and 8.1. As of January ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Credential Stuffing Attack Strikes Norton LifeLock
Import from wordpress feed
January 19, 2023
Norton LifeLock, a leading provider of identity protection and cybersecurity services, recently experienced a data breach caused by a credential stuffing attack.  Credential stuffing is a cyberattack in which a hacker uses ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Stolen Financial Data Used as Bait in New Phishing Scheme
Import from wordpress feed
January 11, 2023
Hackers are baiting their victims with stolen financial data in a clever phishing scheme. Over 400,000 data points, including identity numbers, names, phone numbers, and payment records, are used to persuade consumers ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Managed IT Services: The Key to Staying Competitive in the Digital Age
Import from wordpress feed
January 10, 2023
As a managed IT service provider, we understand the importance of technology in helping businesses stay competitive in the digital age. In today’s fast-paced business environment, staying up-to-date with the latest tools ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Twitter Data of 235 Million Accounts Leaked
Import from wordpress feed
January 09, 2023
A dataset purportedly comprising the email addresses and phone numbers of over 400 million Twitter users just a few weeks ago was listed for sale on the hacker forum Breached Forums. The ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Android Malware Targets Financial Institutions
Import from wordpress feed
January 07, 2023
Since October 2022, a new kind of malware has been targeting financial institutions. A widespread and powerful type of Android malware has turned its focus to online banking apps, employing keylogging capabilities ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Benefits of VoIP Technology in Your Business
Import from wordpress feed
January 06, 2023
VoIP stands for voice over internet protocol, and the technology has been around since 1993, allowing companies to save money and improve productivity. VoIP is a method that allows you to transmit ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

The End of an Era: Verizon Shuts Down 3G Network
Import from wordpress feed
January 05, 2023
Verizon, a major wireless company in the United States, has announced that it will no longer offer 3G cellular data as of December 31st, 2022. It marks the end of an era ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

How to Choose the Right Software for Your Business Needs
Import from wordpress feed
January 04, 2023
As a business owner, it’s crucial to have the right tools in place to help your business run smoothly and efficiently. One of the critical tools you’ll need is the right software. ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

270,000 Patients Exposed in Louisiana Healthcare Ransomware Attack
Import from wordpress feed
January 03, 2023
This past October, during a ransomware assault on a healthcare facility in southwest Louisiana, hackers collected and exposed the personal information of approximately 270,000 patients and workers. A ransomware organization known as ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Maximize Your Business Potential with Managed IT Services
Import from wordpress feed
January 02, 2023
Companies of all sizes may benefit from managed IT services since they offer a variety of technical support and maintenance services while also saving time and money. Managed IT services may benefit ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Jump-Start Your Companies Social Media Presence
Import from wordpress feed
December 31, 2022
Social media marketing is an effective tool used to promote your company online. Many people use social media channels to promote products or services; however, companies can also use social media to ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

FBI Program Tasked with Infrastructure Security Compromised
Import from wordpress feed
December 22, 2022
The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program’s data on the dark web. The breach was initially disclosed by ...

See publication

Tags: Cybersecurity, Risk Management

Streamline Your Business with the Latest Smart Home Technology
Import from wordpress feed
December 21, 2022
Are you a business owner looking to get the most out of your Google smart home devices? If so, you’re in luck! Google has enabled its Nest products and Android OS with ...

See publication

Tags: Cybersecurity, Risk Management

Data Breach at Sequoia One Exposes Sensitive Customer Information
Import from wordpress feed
December 20, 2022
What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that ...

See publication

Tags: Cybersecurity, Risk Management

Cisco Reports Critical IP Phone Vulnerability
Import from wordpress feed
December 19, 2022
As a business owner, it’s important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and ...

See publication

Tags: Cybersecurity, Risk Management

Google Chrome Releases Two New Features
Import from wordpress feed
December 17, 2022
Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer’s memory. This can be ...

See publication

Tags: Cybersecurity, Risk Management

Last Microsoft Edge Update for 2022
Import from wordpress feed
December 16, 2022
A new version of Microsoft Edge is available for Windows, macOS, and Linux. While the update is relatively small, it contains two feature upgrades and significant security fixes, including one for the ...

See publication

Tags: Cybersecurity, Risk Management

Automate Your Business
Import from wordpress feed
December 15, 2022
If you run your own business, it can take up a lot of your time. For example, you might spend hours manually posting to social media, writing emails, and much more. While ...

See publication

Tags: Cybersecurity, Risk Management

Gmail Improves Search Feature
Import from wordpress feed
December 14, 2022
Google has started using machine learning to understand what users are looking for within their email. Google has reported that it has enhanced its email search to produce more relevant results by ...

See publication

Tags: Cybersecurity, Risk Management

Adobe Acrobat Streamlines PDF Experiences in Microsoft Teams
Import from wordpress feed
December 13, 2022
Whether you’re a student or an employee, digital documents are now essential for the future of work. While there are different types of digital documents, one of the most often used document ...

See publication

Tags: Cybersecurity, Risk Management

Effortlessly Share Files with Google Drive
Import from wordpress feed
December 12, 2022
According to a post on Google’s official blog site, the company is making it even more straightforward to share files with coworkers by making new suggested contacts available directly from the share ...

See publication

Tags: Cybersecurity, Risk Management

Apple Announces Advanced Data Protection for iCloud
Import from wordpress feed
December 10, 2022
Apple released several new security features on December 7th, 2022, designed to keep users’ sensitive data and communications secure. Advanced Data Protection for iCloud is one of the most notable features for ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

November Brings New Features to Microsoft Teams
Import from wordpress feed
December 09, 2022
With hundreds of thousands of users daily, Microsoft continuously develops new and innovative ideas to simplify business, school, and everyday tasks. It was a busy month for Microsoft in November as the ...

See publication

Tags: Cybersecurity, Risk Management

Google’s Continuous Scrolling Now on Desktops
Import from wordpress feed
December 08, 2022
On December 5th, 2022, Google announced on Twitter that it is bringing continuous scrolling to the United States desktop users. Traditionally, while searching on Google, users could wander through pages to find ...

See publication

Tags: Cybersecurity, Risk Management

The Benefits of Implementing a CRM Solution
Import from wordpress feed
December 07, 2022
Customer Relationship Management (CRM) software allows marketing teams to manage customer interactions better, track customer relationships, and monitor customer activity. It also will enable businesses to collect detailed profiles of their customers, ...

See publication

Tags: Cybersecurity, Risk Management

SiriusXM Flaw Unlocks Vehicles and More
Import from wordpress feed
December 06, 2022
A somewhat concerning flaw has been fixed by SiriusXM that would allow unauthorized individuals to unlock doors remotely and start engines by only having the vehicle identification number (VIN). Sam Curry, a ...

See publication

Tags: Cybersecurity, Risk Management

End-to-End Encryption for Dropbox Business Users
Import from wordpress feed
December 05, 2022
Dropbox has announced its plans to purchase several key assets from Boxcryptor so that it is able to provide end-to-end encryption for its business users. In addition, the partial merger between the ...

See publication

Tags: Cybersecurity, Risk Management

Lastest LastPass Security Incident
Import from wordpress feed
December 03, 2022
According to LastPass CEO Karim Toubba, the password manager has been hacked once again. A data breach occurred in the development environment only a few months ago, prompting LastPass to announce they ...

See publication

Tags: Cybersecurity, Risk Management

How AI is Transforming Businesses
Import from wordpress feed
December 01, 2022
While artificial intelligence (AI) is seen as a new phenomenon in mainstream society, it is not a new concept. As AI technologies increase, AI is becoming increasingly important for companies looking to ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Scammers Impersonating Refund Payment Portals
Import from wordpress feed
November 30, 2022
The FBI warns about scammers pretending to be refund payment gateways from financial institutions to steal sensitive information from unsuspecting victims. The federal law enforcement agency stated that scammers deceive victims into ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Twitter’s Data Leak Exposes Over 5.4 Million Users
Import from wordpress feed
November 29, 2022
Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users. Twitter denied claims that hackers had leaked the ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Phishing-as-a-Service on the Rise with Caffeine
Import from wordpress feed
November 28, 2022
Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like “Caffeine.” Through an open registration procedure, anyone who wishes to launch ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Vice Society Claims Cincinnati State College Cyberattack
Import from wordpress feed
November 26, 2022
Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on the hackers’ websites. These documents ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Hackers Execute Arbitrary Code with Microsoft Office
Import from wordpress feed
November 25, 2022
According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device remotely. Microsoft announced the issue ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Malicious SEO Campaign Affects Thousands of Sites
Import from wordpress feed
November 24, 2022
In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As a result, almost 15,000 sites have been compromised. In September 2022, researchers ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Phishing Kit Targets US Shoppers
Import from wordpress feed
November 23, 2022
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and Halloween. The kit combines several ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Lenovo Patches Critical Security Flaws
Import from wordpress feed
November 22, 2022
Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers update their systems immediately. The flaws ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

DuckDuckGo Releases App Tracking Protection Beta for Android
Import from wordpress feed
November 21, 2022
The feature is comparable to Apple’s ‘App Tracking Transparency. However, unlike Apple, DuckDuckGo’s method does not rely on app developers’ compliance with user choice. All known trackers are blocked. According to DuckDuckGo, ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

How To Develop Accountability In Remote Workers
Import from wordpress feed
November 19, 2022
Accountability can be a tricky thing when it comes to your remote employees.  It’s something that even seasoned managers struggle with. If that’s the boat you find yourself in, take notes!  In ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Bypass Android Lock Screen on Pixel and Other Devices
Import from wordpress feed
November 18, 2022
David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel 6 and Pixel 5 devices, allowing anybody with physical access to the ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Recent Growth of Fake LinkedIn Accounts
Import from wordpress feed
November 17, 2022
According to a KrebsOnSecurity article, the recent growth of phony LinkedIn accounts is causing an identity crisis for the business networking site and organizations that rely on it to hire and evaluate ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Implementing SSO in Your Business
Import from wordpress feed
November 16, 2022
When you’re a business owner, you always look for ways to streamline processes and improve efficiency. A single sign-on (SSO) system is a great way to simplify authentication. It allows users to ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

SaaS Phishing Attacks Are Increasing
Import from wordpress feed
November 15, 2022
It’s getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto Networks’ Unit 42 revealed that ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

VoIP Features Enhance Customer Experience
Import from wordpress feed
November 14, 2022
There are many reasons why staff may be required to put customers on hold. However, Voice-over Internet Protocol (VoIP) technology can be utilized to ensure that callers do not feel abandoned ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

The Rise of Encryption in Businesses
Import from wordpress feed
November 12, 2022
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it. Encryption transforms readable data into ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Hundreds of U.S. News Outlets Affected by Malware
Import from wordpress feed
November 11, 2022
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates malware to major media ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Zoom Unveils New Productivity Tools
Import from wordpress feed
November 09, 2022
While holding its Zoomtopia event on November 8, 2022, the video conferencing giant announced the release of two brand-new productivity tools for Zoom users. In addition to the communication and collaboration tools ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Attacks on Business VPNs are Increasing
Import from wordpress feed
November 08, 2022
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Dropbox Suffers Major Breach in Phishing Attack
Import from wordpress feed
November 07, 2022
It’s no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

SIM Swap Attack Targets Verizon Customers
Import from wordpress feed
November 05, 2022
Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon’s prepaid wireless accounts, compromising approximately 250 individuals. ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Benefits of Having a Dual Monitor Setup for Your Business
Import from wordpress feed
November 04, 2022
In recent years, the use of advanced technology in the office has increased in popularity among businesses to improve their efficiency, productivity, and effectiveness. Whether running a small or large company, ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Zoom Fixes Severe Security Vulnerability for Mac Users
Import from wordpress feed
November 03, 2022
There is no doubt that Zoom has become very popular in the business and academic sectors, as it is widely used for video conferencing and voice-over IP (VoIP). Zoom issued a security ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

The Evolution of Callback Phishing Scams
Import from wordpress feed
November 02, 2022
Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email campaigns that pose as ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

DuckDuckGo for Mac Comes with New Privacy Features
Import from wordpress feed
November 01, 2022
DuckDuckGo announced on October 18, 2022, that the beta version of its Mac desktop app is now available for all Mac users.  DuckDuckGo is a browser that focuses on privacy. It has ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Ducktail Malware Returns With New PHP Variant
Import from wordpress feed
October 31, 2022
An advanced PHP variant of the Ducktail malware poses a risk to Facebook users. On October 13th, 2022, ZScaler, a cloud security firm, published a blog post detailing this latest discovery. The ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

DDoS IP Protection: A New, Low-Cost Option for SMB
Import from wordpress feed
October 29, 2022
Microsoft announced the Azure DDoS IP Protection released as a public preview on October 19, 2022. Small and medium-sized businesses (SMBs) can now benefit from DDoS protection with a pricing model customized ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Common Mistakes To Avoid When Implementing A CRM For Your Business
Import from wordpress feed
October 28, 2022
In order to be successful, it is important for businesses to have a good customer relationship management system in place. However, many small companies make simple mistakes that get them in trouble. ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Fortinet Security Updates
Import from wordpress feed
October 27, 2022
Fortinet addressed a critical vulnerability that gave remote access to numerous services and was being exploited by threat actors in the wild. The company described the vulnerability as an authentication bypass on ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Toyota T-Connect Database Exposed
Import from wordpress feed
October 26, 2022
On October 7, 2022, Toyota Motor Corporation made an announcement that the personal information of approximately 296,000 consumers had been compromised. The Toyota T-Connect system enables owners of Toyota automobiles to link ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Firefox 106 Update: What’s New and Improved
Import from wordpress feed
October 25, 2022
On October 18, 2022, Firefox 106 Stable and Firefox 102.4 ESR were released to the public. New features A new Colorways theme, Firefox view, PDF editing, text recognition, and extraction on macOS ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Personal Information Compromised in City of Tucson Data Breach
Import from wordpress feed
October 24, 2022
 In light of a recent data breach, the City of Tucson, Arizona, is alerting approximately 123,000 citizens that their personal information has been compromised. The issue was detected in May 2022, but ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Intel Confirms Leak of Alder Lake BIOS Source Code
Import from wordpress feed
October 20, 2022
After a source code leak was posted by an unidentified third party on 4chan and GitHub last week, the technology giant Intel has confirmed that confidential source code related to its Alder ...

See publication

Tags: Cybersecurity, Risk Management

New AI Upgrades to Adobe Photoshop and Premiere Elements
Import from wordpress feed
October 19, 2022
While Premiere Elements 2023 is receiving a couple of new features and a considerable speed boost, Photoshop Elements 2023 adds some powerful new features and enhanced performance. Along with these enhancements, both ...

See publication

Tags: Cybersecurity, Risk Management

Cloudflare Revolutionizes CAPTCHAs
Import from wordpress feed
October 18, 2022
Turnstile, an ambitious new project from Cloudflare, aims to do away with the CAPTCHAs that are now being used on the internet to confirm users are not robots. Turnstile utilizes a revolving ...

See publication

Tags: Cybersecurity, Risk Management

DDoS Attacks Target Major U.S. Airports
Import from wordpress feed
October 17, 2022
Some major U.S. airports’ websites were inaccessible early on Monday, October 10, 2022, due to a coordinated denial-of-service assault orchestrated by professional hackers. However, officials said flights were unaffected. The assaults, in ...

See publication

Tags: Cybersecurity, Risk Management

Cybersecurity Attack Hits U.S. Healthcare System
Import from wordpress feed
October 15, 2022
On October 4th, 2022 a cybersecurity incident has disrupted CommonSpirit Hospitals. With more than 150,000 employees, 20,000 physicians, and serving 21 million patients, CommonSpirit Hospitals is the second-largest nonprofit hospital system in ...

See publication

Tags: Cybersecurity, Risk Management

The Advantages of VoIP for Businesses
Import from wordpress feed
October 14, 2022
Voice over IP, or VoIP, has become increasingly popular among business owners. However, many business owners ask if VoIP is viable in a landscape where many voice systems are either no longer ...

See publication

Tags: Cybersecurity, Risk Management

Updated Malware Attacks Point of Sale Devices
Import from wordpress feed
October 13, 2022
This year, security experts have found three updated versions of Prilex malware that target point-of-sale systems. In 2014, Prilex was a type of malware that targeted ATMs. It switched to PoS (point ...

See publication

Tags: Cybersecurity, Risk Management

Create a Secure Environment for Remote Workers
Import from wordpress feed
October 12, 2022
Having remote workers in your business is a great way to expand cost-effectiveness and helps your business grow. But, unfortunately, many businesses have issued remote workers limited access to the network to ...

See publication

Tags: Cybersecurity, Risk Management

Google Unveils New Products at Pixel Event 2022
Import from wordpress feed
October 11, 2022
During a press event in New York City, Google unveiled the new Pixel 7 and Pixel 7 Pro devices, the brand-new Pixel Watch, and a teaser for a forthcoming 2023 Pixel Tablet. ...

See publication

Tags: Cybersecurity, Risk Management

Microsoft Edge Improves Performance
Import from wordpress feed
October 10, 2022
Engineers at Microsoft recently announced performance improvements for their Edge browser.  A blog post that the company published recently explained how. A blog post from the company explained how: “Beginning with Microsoft ...

See publication

Tags: Cybersecurity, Risk Management

DuckDuckGo Email Privacy Service Beta Released
OutSecure
September 26, 2022
DuckDuckGo has a reputation for protecting the privacy of its users far more than most other companies. Last year, the tiny search engine announced that they were experimenting with a free service designed to dodge email trackers as a means of further protecting the privacy of its users.

See publication

Tags: Cybersecurity, Risk Management

Apple Products Released at Far Out Event
OutSecure
September 24, 2022
On September 7, 2022, Apple hosted its annual product release event at one pm Eastern Time (ET). Tim Cook, Apple’s CEO, took the stage at the Far Out event held at the company’s headquarters in Cupertino, California, to unveil a slew of brand-new and significantly enhanced devices. The iPhone 14 and several new smartwatches and AirPods are among the latest products.

See publication

Tags: Cybersecurity, Risk Management

Microsoft Teams Vulnerability Discovered
OutSecure
September 23, 2022
Microsoft Teams is a part of the 365 product family and is used by more than 270 million people for exchanging text messages, videoconferencing, and file storage.

In August of 2022, the team at Vectra Protect discovered a post-exploitation vulnerability in the plaintext storage disk used by Microsoft Teams while conducting research for a client. This vulnerability gives malicious actors, with either the local or remote systems access, the ability to obtain valid user credentials. Vectra discovered that the unencrypted credential management weakness affected all commercial and GCC Desktop Teams clients for Windows, Mac, and Linux

See publication

Tags: Cybersecurity, Risk Management

Lenovo Issues Important Update
OutSecure
September 22, 2022
Lenovo issued a security notice informing customers of multiple serious BIOS vulnerabilities affecting hundreds of Lenovo devices across various models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad, ThinkAgile, ThinkStation, ThinkSystem).

See publication

Tags: Cybersecurity, Risk Management

Uber Hacked Again
OutSecure
September 21, 2022
An unknown hacker, who claims to be eighteen years old, acquired administrative access to Uber’s corporate network and proprietary internal tools on Thursday, September 15, 2022.

On September 15, 2022, at 6:25 pm PT, Uber issued a statement on Twitter that it was “responding to a cybersecurity incident.”

An attacker gained access to the account of an Uber EXT contractor. A malware-infected personal device compromised the contractor’s credentials. The contractor accepted the multi-factor authentication through a socially engineered attack, enabling the hacker access to the contractor’s account

See publication

Tags: Cybersecurity, Risk Management

Google Leaving IoT Services
OutSecure
September 20, 2022
Tech giant Google recently announced that it’s closing the doors on its IoT Core service. Their stated reason for doing so was that their strategic partners can better manage customers’ IoT services and devices. Time will tell if the company’s decision was a good one.

See publication

Tags: Cybersecurity, Risk Management

Cyber Security Best Practices For Businesses
Import from wordpress feed
September 17, 2022
Smaller companies often struggle to develop and invest in robust IT security systems, which can leave them relatively more vulnerable to cyber attacks. If that’s the situation you’re in and you’re trying ...

See publication

Tags: Cybersecurity, Risk Management

Zoom Outage Reported
Import from wordpress feed
September 16, 2022
Recently Zoom, a popular, cloud-based communications platform used for online meetings and video conferencing, experienced an outage that impacted tens of thousands of users worldwide. The issue began shortly after 8:00 am ...

See publication

Tags: Cybersecurity, Risk Management

Latest Microsoft Patch Fixes Dozens of Bugs
Import from wordpress feed
September 15, 2022
Even if you don’t consistently install Microsoft’s security patches as soon as they’re released, the September 2022 patch released this week deserves immediate attention. Dozens of bugs, flaws, and vulnerabilities were addressed ...

See publication

Tags: Cybersecurity, Risk Management

New Phishing Service Is Targeting Banks
Import from wordpress feed
September 14, 2022
Hackers are increasingly adopting practices that legitimate business owners will immediately recognize. Recently, a new PhaaS (Phishing as a Service) operation has surfaced that specifically targets major banks. These banks include Bank ...

See publication

Tags: Cybersecurity, Risk Management

Fresh Look For Gmail Users Has Been Released
Import from wordpress feed
September 13, 2022
If you’re a Gmail user and you haven’t seen the change already, be aware that Google has freshened up their email interface.  Don’t expect a radical change, however.  This update is more ...

See publication

Tags: Cybersecurity, Risk Management

Apple To Settle Butterfly Keyboard Lawsuit
Import from wordpress feed
September 12, 2022
Do you have a MacBook with a Butterfly Keyboard?  If so, keep an eye out for an email regarding the Butterfly Keyboard class action lawsuit. Recently, Apple has agreed to pay out ...

See publication

Tags: Cybersecurity, Risk Management

Microsoft Resolves File Explorer Freezing Bug In Windows 11
Import from wordpress feed
September 10, 2022
Recent Windows 11 updates have been problematic in several ways.  That’s not the end of the world, but it has been more than a little frustrating for those in the test group ...

See publication

Tags: Cybersecurity, Risk Management

RDP Brute Force Attacks Blocked By Windows 11
Import from wordpress feed
September 09, 2022
A small but important feature was recently incorporated by the Windows 11 design team.  A new Account Lockout Policy enabled by default has been added.  This policy automatically locks user accounts (including ...

See publication

Tags: Cybersecurity, Risk Management

New Android Malware Disables WiFi To Attempt Toll Fraud
Import from wordpress feed
September 08, 2022
There’s a new threat to be aware of if you own an android device.  Microsoft recently warned that their researchers had spotted a new toll fraud malware strain wreaking havoc in the ...

See publication

Tags: Cybersecurity, Risk Management

DuckDuckGo Browser Blocks Microsoft Trackers
Import from wordpress feed
September 07, 2022
If you haven’t heard of DuckDuckGo, it’s a tiny browser that only gets a fraction of the traffic that Google does. If we’re being honest, it gets only a fraction of the ...

See publication

Tags: AI, Cybersecurity, Risk Management

WordPress Plugin Leaves Sites Vulnerable
Import from wordpress feed
September 06, 2022
Researchers at Defiant authored the popular Wordfence security solution for WordPress users and they have detected a massive campaign that has seen hackers actively scanning for websites employing the Kaswara Modern WPBakery ...

See publication

Tags: AI, Cybersecurity, Risk Management

Technology Advances With Speech-Recognition Via AI Technology
Import from wordpress feed
September 05, 2022
If you haven’t heard of the UK startup Speechmatics, it may come as a surprise to learn that the company may be on its way to becoming a globally recognized brand. The ...

See publication

Tags: AI, Cybersecurity, Risk Management

Windows 11 Apps Are Being Tested For Kiosk Mode
Import from wordpress feed
September 03, 2022
There’s interesting news in the world of Windows 11 development.  Microsoft recently began testing a new Kiosk feature that will enable IT administrators to limit which applications users can use while logged ...

See publication

Tags: AI, Cybersecurity, Risk Management

Skimmers Are Stealing Credit Card Information From US Restaurants
Import from wordpress feed
September 02, 2022
If you eat out or are in the habit of ordering take-out on a regular basis, be aware. Recently, a large, well-organized web-skimming campaign has been uncovered that allowed hackers to swipe ...

See publication

Tags: AI, Cybersecurity, Risk Management

Nvidia Leads Quantum Computing Innovation With New Platform
Import from wordpress feed
September 01, 2022
Quantum computing is on the horizon.  Unfortunately, it’s been on the horizon for at least two decades.  It’s one of those technologies that’s always “just around the corner.” In recent years, however, ...

See publication

Tags: AI, Cybersecurity, Risk Management

Large Scale Okta Phishing Campaign Targets Many Organizations
Import from wordpress feed
August 31, 2022
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These ...

See publication

Tags: AI, Cybersecurity, Risk Management

Healthcare Data Breach Exposes 1.3 Million Patients
Import from wordpress feed
August 30, 2022
Do you make use of the “MyChart” portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed a data ...

See publication

Tags: AI, Cybersecurity, Risk Management

LastPass Has Been Hacked
Import from wordpress feed
August 29, 2022
Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It’s generally good advice, but what happens when the makers ...

See publication

Tags: AI, Cybersecurity, Risk Management

New Tools Available With Kali Linux 2022.3
Import from wordpress feed
August 27, 2022
Do you have the Kali Linux distribution running on one of the machines you own?  If you’re not sure what that is, then you almost certainly don’t.  Kali is a Linux distro ...

See publication

Tags: AI, Cybersecurity, Risk Management

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability
Import from wordpress feed
August 26, 2022
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There’s a way that ...

See publication

Tags: Cybersecurity, Risk Management

Lenovo Models Affected By Medium Severity Vulnerabilities
Import from wordpress feed
August 25, 2022
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and ...

See publication

Tags: Cybersecurity, Risk Management

Microsoft 365 Suggests Rollback After Issues From Update
Import from wordpress feed
August 24, 2022
Does your company use Microsoft 365?  If so, and you’ve noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the ...

See publication

Tags: Cybersecurity, Risk Management

IoT Security With Microsoft Defender
Import from wordpress feed
August 23, 2022
The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They ...

See publication

Tags: Cybersecurity, Risk Management

Hackers Use VoIP Systems To Install PHP Web Shells
Import from wordpress feed
August 22, 2022
Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of ...

See publication

Tags: Cybersecurity, Risk Management

Google Experiences International Outage
Import from wordpress feed
August 20, 2022
“Just Google it.”  You’ve probably heard that phrase a thousand times.  In fact, you may use it yourself on a regular basis. Unfortunately, Googling it wasn’t possible recently.  The iconic search giant ...

See publication

Tags: Cybersecurity, Risk Management

Apple Users Will Want To Update As Soon As Possible
Import from wordpress feed
August 19, 2022
Do you own a device running macOS Monterey 12.5.1, or iOS/iPadOS 15.6.1? If so, you’ll want to download and install the latest patches as soon as possible. Apple recently released a small ...

See publication

Tags: Cybersecurity, Risk Management

Raspberry Robin Worm In Hundreds Of Windows Networks
Import from wordpress feed
August 18, 2022
Analysts at Red Canary Intelligence have recently spotted a Windows worm on hundreds of networks belonging to a wide range of organizations around the world. Dubbed “Raspberry Robin” by the research team ...

See publication

Tags: Cybersecurity, Risk Management

The Importance Of Having An Email Newsletter
Import from wordpress feed
August 17, 2022
Most business owners understand the importance of being active on at least one social media channel. That’s fine as far as it goes, but have you considered supplementing your social media presence with ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Prepare For Windows Server 2012 End Of Support
Import from wordpress feed
August 16, 2022
Another week, another Microsoft “End of Life” reminder to write about. This time, it’s Windows Server 2012 R2.  If you’re a user, then you’re probably already aware of the looming deadline. If ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Microsoft Is Phasing Out Windows 8.1
Import from wordpress feed
August 15, 2022
If you are still using Windows 8.1 and if you’ve somehow managed to avoid seeing the parade of notices Microsoft has been sending out, you should know that the end is nigh. ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Twilio Data Breach Happened Via Employee Smishing
Import from wordpress feed
August 13, 2022
Twilio is the Cloud Communications Company. They are the latest to fall victim to a data breach. The company recently disclosed that some of its customer data was accessed by unknown attackers ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

OpenSea Warns Users Of Phishing Attacks From Data Breach
Import from wordpress feed
August 12, 2022
Are you a fan of NFTs?  If so, you’ve probably heard of OpenSea, which is the largest marketplace for non-fungible tokens. If you have an account there, be aware that recently the ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Microsoft Office And Google Docs Sync For Offline Use
Import from wordpress feed
August 11, 2022
Recently, Google announced a small but significant change to Google Docs.  Now, if you have enabled offline access for files you have stored on your Google Drive, the system will auto-sync any ...

See publication

Tags: Cybersecurity, Risk Management

Secret Twitter Accounts Are Not What You Think
Import from wordpress feed
August 10, 2022
Do you have a Twitter account?  Have you been patting yourself on the back while assuming that your identity was a secret, allowing you to ply the waters of Twitter in anonymity? ...

See publication

Tags: Cybersecurity, Privacy, Risk Management

Essential Pillars of Trustworthy AI : Pillar # 2 - Privacy, Prepare to take action
LinkedIn
August 09, 2022
What makes Privacy a essential pillar for Trust in AI? Is achieving Privacy in AI more important or complex than in conventional systems?

See publication

Tags: Cybersecurity, Privacy, Risk Management

Malware Is Targeting Small Office And Home Office Routers
Import from wordpress feed
August 09, 2022
Researchers at Lumen’s Black Lotus Labs recently spotted evidence of a highly sophisticated and tightly targeted campaign aimed at SOHO (small office/home office) routers across both Europe and North America. Based on ...

See publication

Tags: Cybersecurity, Risk Management

New Version Releases For iOS Devices
Import from wordpress feed
August 08, 2022
Apple has recently announced a new string of updates for their OS family including iOS, iPadOS 15.6, macOS 12.5, watchOS 8.7 and tvOS 15.6. Bear in mind that the next version of ...

See publication

Tags: Cybersecurity, Risk Management

How To Easily Create An Efficient Workspace
Import from wordpress feed
August 06, 2022
The more efficient you are, the more effective you are.  That’s true whether you’re working from the office or from home. Fortunately, most office environments lend themselves to being efficient, so there’s ...

See publication

Tags: Cybersecurity, Risk Management

Hackers Are Stealing Facebook Accounts With Malicious Messenger Bots
Import from wordpress feed
August 05, 2022
Researchers at Trustwave have shed light on a recently discovered phishing campaign revolving around Facebook Messenger bots. If you don’t spend much time on social media, chatbots are programs designed to impersonate ...

See publication

Tags: Cybersecurity, Risk Management

Fake Copyright Infringement Emails Used To Spread Malware
Import from wordpress feed
August 04, 2022
Hackers found a new way to slip malware past your defenses.  Researchers around the world have spotted a curious new campaign designed to scare victims by sending them emails warning of copyright ...

See publication

Tags: Cybersecurity, Risk Management

Conflict Resolution In The Workplace
Import from wordpress feed
August 03, 2022
Conflict in the workplace is sadly inevitable.  Put a group of people in a room together for eight hours or longer every day, week after week. No matter how well they get ...

See publication

Tags: Cybersecurity, Risk Management

Android And iOS Network Protection Added With Microsoft Defender
Import from wordpress feed
August 02, 2022
Recently, Microsoft added a new feature for Microsoft Defender for Endpoint (MDE) which has fans of the product cheering. Once the new “Mobile Network Protection” feature is enabled on the iOS and ...

See publication

Tags: Cybersecurity, Risk Management

The Windows 11 Apps That Use Your Microphone And Camera
Import from wordpress feed
August 01, 2022
Are you a member of the Windows 11 Insiders group?  If so, then you already know that you get a sneak peek at all the cool new features the engineers at Microsoft ...

See publication

Tags: Cybersecurity, Risk Management

Conduct More Effective Meetings With These Simple Tips
Import from wordpress feed
July 30, 2022
Do the meetings you hold tend run off the rails? Do you find that they frequently run far longer than you intended and that very little actually comes out of them? If ...

See publication

Tags: Cybersecurity, Risk Management

WordPress NinjaForms Plugin Was Force Updated Due To Vulnerability
Import from wordpress feed
July 29, 2022
Do you run a WordPress site?  Do you also use the popular forms design and management plugin called NinjaForms?  If you answered yes to both of those questions, be aware that NinjaForms ...

See publication

Tags: Cybersecurity, Risk Management

Voicemail Phishing Attacks Called Vishing Are On The Rise
Import from wordpress feed
July 28, 2022
While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before, ...

See publication

Tags: Cybersecurity, Risk Management

Simple Tips For Securing Smart Device Data
Import from wordpress feed
July 27, 2022
Data security isn’t something that’s at the forefront of most people’s minds, but it probably should be.  These days, we use far more than just our trusty laptops and desktops to do ...

See publication

Tags: Cybersecurity, Risk Management

The Surprising Ways Mobile Technology Impacts Our Lives
Import from wordpress feed
July 27, 2022
If you grew up in the days before the internet, it’s absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...

See publication

Tags: Cybersecurity, Risk Management

One Of The Largest US Banks Discloses Data Breach
Import from wordpress feed
July 26, 2022
Do you have an account with Michigan-based Flagstar Bank?  As one of the largest banks in the United States, it’s quite possible that you do. If so, be aware that the company ...

See publication

Tags: Cybersecurity, Risk Management

Microsoft Believes AI Can Help Prevent Ransomware In The Future
Import from wordpress feed
July 25, 2022
Recently, Microsoft published a fascinating blog post. In the blog post, they said they were experimenting with “novel approaches” when it comes to harnessing the power of AI to spot threats on ...

See publication

Tags: Cybersecurity, Risk Management

Simple Ways To Hire The Perfect Candidate The First Time
Import from wordpress feed
July 23, 2022
Top quality talent can be difficult to find in any field, but if you own or manage a tech company, the challenge can be an especially daunting one.  There’s tremendous competition for ...

See publication

Tags: Cybersecurity, Risk Management

You May Need To Replace Old Cisco VPN Routers
Import from wordpress feed
July 22, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...

See publication

Tags: Cybersecurity, Risk Management

Some Requested Features May Be Coming To Microsoft Teams
Import from wordpress feed
July 21, 2022
Do you use Microsoft Teams?  If so, you’ll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...

See publication

Tags: Cybersecurity, Risk Management

It May Be Time To Update Your Business Logo
Import from wordpress feed
July 20, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike “swoosh,” and Apple’s Apple all come to mind. Logo images give companies ...

See publication

Tags: Cybersecurity, Risk Management

Researchers Find New CPU Security Vulnerability
Import from wordpress feed
July 19, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...

See publication

Tags: Cybersecurity, Risk Management

Ransomware Hackers Have Set Their Sights On Exchange Servers
Import from wordpress feed
July 18, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...

See publication

Tags: Cybersecurity, Risk Management

The Surprising Ways Mobile Technology Impacts Our Lives
Import from wordpress feed
July 16, 2022
If you grew up in the days before the internet, it’s absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...

See publication

Tags: Cybersecurity, Risk Management

Edge Will Replace Internet Explorer After It Is Gone
Import from wordpress feed
July 15, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...

See publication

Tags: Cybersecurity, Risk Management

New Panchan Botnet Targets Linux Servers
Import from wordpress feed
July 14, 2022
If you’re involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...

See publication

Tags: Cybersecurity, Risk Management

How To Protect Your Company With Cybersecurity Awareness
Import from wordpress feed
July 13, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...

See publication

Tags: Cybersecurity, Risk Management

Data Breach Hits One Of America’s Largest Healthcare Providers
Import from wordpress feed
July 12, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...

See publication

Tags: Cybersecurity, Risk Management

Cisco Email Gateway Appliance Users Should Apply Security Patch
Import from wordpress feed
July 11, 2022
Tech giant Cisco recently sent out a notification to its vast customer base urging them to apply a recently issued patch that addresses a critical security vulnerability. This vulnerability could allow an ...

See publication

Tags: Cybersecurity, Risk Management

Simple Ways To Hire The Perfect Candidate The First Time
Import from wordpress feed
July 09, 2022
Top quality talent can be difficult to find in any field, if you have spent any time looking for and hiring people, you know the challenge can be an especially daunting one.  ...

See publication

Tags: Cybersecurity, Risk Management

Massive Phishing Attack Scammed Millions Of Facebook Messenger Users
Import from wordpress feed
July 08, 2022
According to research conducted by the cybersecurity firm PIXM, there is a massive phishing campaign that peaked in April and May of this year (2022) and it is still ongoing. The campaign ...

See publication

Tags: Cybersecurity, Privacy

Researchers Warn About Symbiote Malware Which Attacks Linux Machines
Import from wordpress feed
July 07, 2022
Are you a Linux user?  If so, be aware that there is a new kind of malware to be concerned about. The BlackBerry Threat Research and Intelligence team, in concert with Joakim ...

See publication

Tags: Cybersecurity, Privacy

New Malware Uses Word Documents To Get On Your System
Import from wordpress feed
July 06, 2022
Researchers at HP have discovered a new malware loader that they’ve dubbed SVCReady.  While new malware strains are common, this one is distinct for a couple of different reasons. Like many malicious ...

See publication

Tags: Cybersecurity, Privacy

Microsoft Adding Restore Apps Feature To Make Reinstalling Easier
Import from wordpress feed
July 05, 2022
Are you excited about Windows 11?  Many people are and in fact there are legions of beta users who are in the Windows Insiders group so they can get a sneak peek ...

See publication

Tags: Cybersecurity, Privacy

Hackers Are Teaming Up To Wreak Havoc On Corporate Users
Import from wordpress feed
July 04, 2022
It’s never a good thing when well-organized groups of hackers start working together, but that’s what appears to be happening. Recently, evidence has emerged that the Black Basta ransomware gang has begun ...

See publication

Tags: Cybersecurity, Privacy

Emotet Malware Will Include Credit Card Theft In Attacks
Import from wordpress feed
July 02, 2022
If you’re involved in information security in any capacity, you’re probably quite familiar with the infamous Emotet botnet.  It’s one of the most dangerous and prolific botnets out there and it is ...

See publication

Tags: Cybersecurity, Privacy

Medical Service Provider Data Breach Affects 2 Million Users
Import from wordpress feed
July 01, 2022
Depending on where you live, you may have received medical care from the Shields Health Care Group (Shields), or from a provider associated with them. If so, be aware that the Massachusetts-based ...

See publication

Tags: Cybersecurity, Privacy

Beware New Windows Vulnerability With Remote Search Window Access
Import from wordpress feed
June 30, 2022
You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief. Hickey is the co-founder of a company ...

See publication

Tags: Cybersecurity, Risk Management

Some Carrier Embedded Android Apps May Have Security Vulnerabilities
Import from wordpress feed
June 29, 2022
Recently, Microsoft reported high severity security vulnerabilities in multiple apps offered by large international mobile service providers.  What makes this especially noteworthy is the fact that these vulnerabilities aren’t app specific, but ...

See publication

Tags: Cybersecurity, Risk Management

Millions Of MySQL Server Users’ Data Found On The Internet
Import from wordpress feed
June 28, 2022
Do you maintain a MySQL server?  If so, you’re certainly not alone.  What you may not know is that according to research conducted by The Shadowserver Foundation, (a cybersecurity research group) there ...

See publication

Tags: Cybersecurity, Risk Management

Hackers Are Using Personal Messages On WhatsApp To Attack
Import from wordpress feed
June 27, 2022
Are you a WhatsApp user?  If so, be aware that hackers have worked out a means of hijacking a user’s WhatsApp account and gaining access to a user’s contact list and personal ...

See publication

Tags: Cybersecurity, Risk Management

Microsoft Releases Multiple New Features For Teams
Import from wordpress feed
June 25, 2022
Teams was “just another Microsoft application” before the pandemic.  Thanks to Covid-19 though, demand for video conferencing solutions shot through the roof, and suddenly Teams found its groove. Microsoft had been gamely ...

See publication

Tags: Cybersecurity, Risk Management, Security

Intel Users Should Update Firmware To Avoid This Ransomware
Import from wordpress feed
June 24, 2022
Not long ago, researchers at Eclypsium got a lucky break.  An unknown and unidentified individual began leaking communications from inside the Conti ransomware organization. These leaked communications seemed to confirm what has ...

See publication

Tags: Cybersecurity, Risk Management, Security

The Windows Follina Vulnerability Has A Temporary Fix
Import from wordpress feed
June 23, 2022
File this away under “good news, bad news.” The bad news is that there’s a new, critical zero-day threat to be concerned about.  The threat has been dubbed ‘Follina.’ It is being ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Will Not Release Exchange Server Updates Until 2025
Import from wordpress feed
June 22, 2022
Are you planning on setting up an Exchange server soon or are you running one now?  If so, be aware that Microsoft is changing their guidance when it comes to the technology ...

See publication

Tags: Cybersecurity, Risk Management, Security

Enemybot Malware May Go Beyond DDOS Attacks
Import from wordpress feed
June 21, 2022
Unless you’re an IT Security Professional, you may never have heard of EnemyBot.  It is a bit like the Frankenstein of malware threats, a botnet that has borrowed code from multiple different ...

See publication

Tags: Cybersecurity, Risk Management, Security

This Android Malware Is Stealing Login Credentials
Import from wordpress feed
June 20, 2022
If you’re deeply involved in IT security, you may already be familiar with the ERMAC Android banking trojan. If this is the first time you’re hearing of it, be aware that the ...

See publication

Tags: Cybersecurity, Risk Management, Security

Screencastify Issue Could Allow Someone To Steal Recorded Videos
Import from wordpress feed
June 18, 2022
Are you one of the legions of users making use of the Screencastify Chrome extension?  It’s a fantastic Chrome extension that allows you to almost effortlessly create screencasts for a variety of ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update Google Chrome Soon To Fix Multiple Security Issues
Import from wordpress feed
June 17, 2022
Are you a Google Chrome user?  If so, be aware that the company recently released a stable version of Chrome 102 and is urging all users of its browser to update right ...

See publication

Tags: Cybersecurity, Risk Management, Security

General Motors Customer Data Leaked By Credential Stuffing Attacks
Import from wordpress feed
June 16, 2022
Do you own a Chevrolet, Buick, GMC, or Cadillac?  If so, be aware that GM recently acknowledged that they fell victim to a credential stuffing attack a little over a month ago. ...

See publication

Tags: Cybersecurity, Risk Management, Security

The Latest Windows 11 Update Fixes Dozens Of Issues
Import from wordpress feed
June 15, 2022
Are you a Windows 11 early adopter?  If so, you’ll want to grab the latest update KB5014019.  It contains several important bug fixes including fixes for Direct3D app crashing issues, slow file ...

See publication

Tags: Cybersecurity, Risk Management, Security

Be Aware That ChromeLoader Malware Is Picking Up Steam
Import from wordpress feed
June 14, 2022
A browser hijacker called “ChromeLoader” has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim’s web browser settings to show search ...

See publication

Tags: Cybersecurity, Risk Management, Security

 New Phishing Attacks Use HTML Email Attachments
Import from wordpress feed
June 13, 2022
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply ...

See publication

Tags: Cybersecurity, Risk Management, Security

Upgrade This WordPress Plugin To Avoid Being Hacked
Import from wordpress feed
June 11, 2022
Do you own and manage a WordPress site either personally or as part of your business?  Do you also use the Tatsu plugin which offers a powerful suite of in-browser editing features ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update VMWare Apps Now For Critical Security Vulnerabilities
Import from wordpress feed
June 10, 2022
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware products that are impacted by recently disclosed critical security flaws, either ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update Addresses Zero Day Exploit For Some Apple Devices
Import from wordpress feed
June 09, 2022
If you’re not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn’t yet patched. In many (but not all) ...

See publication

Tags: Cybersecurity, Risk Management, Security

New Phishing Attack Delivers Three Types Of Malware To Victims
Import from wordpress feed
June 08, 2022
Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Warns New Sysrv Botnet Variant Is Dangerous
Import from wordpress feed
June 07, 2022
Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet.  They have dubbed the new variant Sysrv-K. This new variant works in two ways.  First, it exploits a ...

See publication

Tags: Cybersecurity, Risk Management, Security

You Might Need This HP Bios Security Update
Import from wordpress feed
June 06, 2022
HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company.  In both cases, the vulnerabilities ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update Zyxel Products To Fix Possible Security Vulnerability
Import from wordpress feed
June 04, 2022
Do you use a Zyxel firewall?  If so, there’s good news.  The company has fixed an issue you may not have even been aware that you had. The company pushed out the ...

See publication

Tags: Cybersecurity, Risk Management, Security

Say Goodbye To The Apple iPod
Import from wordpress feed
June 03, 2022
It is the end of an era.  Apple recently announced that they were discontinuing the legendary iPod, which is now in its 7th generation of production. When first released more than fifteen ...

See publication

Tags: Cybersecurity, Risk Management, Security

Windows 11 May Release New Feature For Copying Information
Import from wordpress feed
June 02, 2022
If you’re a member of the Windows Insiders group, then you are likely already aware of this. If not, here’s something else to look forward to when Windows 11 is formally released.  ...

See publication

Tags: Cybersecurity, Risk Management, Security

New Method Hides Malware In Windows Event Logs
Import from wordpress feed
June 01, 2022
At least one group of hackers has learned a new trick you need to be aware of.  Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs ...

See publication

Tags: Cybersecurity, Risk Management, Security

Beware Of New Backdoor Malware Targeting Linux Users
Import from wordpress feed
May 31, 2022
The name Kevin Beaumont may not be familiar to you, but if you’re a Linux or Solaris user, he may have just saved you a whole lot of grief. Recently, Mr. Beaumont ...

See publication

Tags: Cybersecurity, Risk Management, Security

New Phishing Scams Using Twitter Account Emails
Import from wordpress feed
May 30, 2022
Hackers around the world are increasingly targeting verified Twitter accounts with emails designed to pilfer your Twitter login credentials. Verified Twitter accounts differ from standard Twitter accounts in that they sport a ...

See publication

Tags: Cybersecurity, Risk Management, Security

Essential Pillars of Trustworthy AI: Building Trustworthy NLP Workshops
LinkedIn
May 28, 2022
We are introducing our first in the series of building AI with Trust collaboration with experts.

See publication

Tags: Cybersecurity, Risk Management, Security

Tricky Ransomware Encrypts Small Data But Overwrites Large Data
Import from wordpress feed
May 28, 2022
The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty.  Called Onyx, outwardly, the operation does what most ransomware campaigns do.  It gets inside a corporate network, exfiltrates the data ...

See publication

Tags: Cybersecurity, Risk Management, Security

Popular Service Being Used To Send Phishing Emails
Import from wordpress feed
May 27, 2022
Google SMTP relay service is wildly popular and used every day by legions of users.  Unfortunately, hackers around the world are aware of this and increasingly they’ve begun abusing the SMTP relay ...

See publication

Tags: Cybersecurity, Risk Management, Security

Security Warnings Coming To Certain Google Apps To Help Users
Import from wordpress feed
May 26, 2022
Google has been making some fantastic changes to bolster user security in recent weeks. That includes changes to their Google Play Store that will require developers to disclose exactly what data they ...

See publication

Tags: Cybersecurity, Risk Management, Security

Three Big Companies Working On Passwordless Login Options
Import from wordpress feed
May 25, 2022
Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Despite years of ...

See publication

Tags: Cybersecurity, Risk Management, Security

New Delivery Method For Ransomware Discovered Called Bumblebee
Import from wordpress feed
May 24, 2022
Some interesting and disturbing changes are afoot in the hacking world.  It appears that the TrickBot gang is now working for the Conti Syndicate. TrickBot is a well-known group of botnet developers ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Edge Browser To Get Free Limited VPN
Import from wordpress feed
May 23, 2022
There’s a big change coming to the Microsoft Edge browser.  Big enough that it may prompt some users to switch to Edge. Recently, Microsoft announced that they’ll be adding a free built-in ...

See publication

Tags: Cybersecurity, Risk Management, Security

Google Soon Informing Users About What Data Apps Collect
Import from wordpress feed
May 17, 2022
A small but important change is coming to your Android apps.  Soon you’ll notice a new Data Safety section on the Google Play Store which will provide greater transparency about exactly what ...

See publication

Tags: Cybersecurity, Risk Management, Security

Some Windows 11 Upgrade Links Could Be Malware
Import from wordpress feed
May 16, 2022
There’s a new hacking campaign underway that you need to be aware of especially if you or anyone you know is interested in upgrading to Windows 11. The campaign appears to be ...

See publication

Tags: Cybersecurity, Risk Management, Security

Netflix Will Soon Crack Down On Password Sharing
Import from wordpress feed
May 14, 2022
Netflix has been talking about cracking down on password sharing for years.  So far, it’s been just talk. Recently, the company suffered its first decrease in subscribers in recent memory. They lost ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Exchange Servers Targeted By Hackers
Import from wordpress feed
May 13, 2022
If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis has discovered ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft May Have A Fix For Windows 10 Freezing Issue
Import from wordpress feed
May 12, 2022
Has your Windows 10 machine been mysteriously freezing up on you lately?  If it has, you’re not alone.  Fortunately, Microsoft’s engineers have identified the root cause of that issue and have released ...

See publication

Tags: Cybersecurity, Risk Management, Security

Some Android Devices May Have Media File Security Vulnerability
Import from wordpress feed
May 11, 2022
Do you have an Android device?  Is it built around a Qualcomm or MediaTek chipset?  If you answered yes to both of those questions, be aware that researchers at Check Point have ...

See publication

Tags: Cybersecurity, Risk Management, Security

LinkedIn Now The Most Spoofed Website For Phishing Emails
Import from wordpress feed
May 10, 2022
Considered to be social media for professionals, LinkedIn is an invaluable tool for millions of people all over the world and a great way to make a wide range of professional connections. ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update Now If You Run This WordPress Plugin
OutSecure
May 09, 2022
Millions of people around the world have leveraged the awesome power of WordPress to build their sites. Whether for personal or business use, WordPress has the flexibility and functionality to create just about any type of site you can dream of.

See publication

Tags: Cybersecurity, Risk Management, Security

Beware Zip Attachments In Emails Could Be Qbot Malware
Import from wordpress feed
May 07, 2022
The owners of the Qbot botnet are changing things up.  The botnet’s normal Modus Operandi for distributing their signature Qbot malware has been to push their malicious code via phishing emails which ...

See publication

Tags: Cybersecurity, Risk Management, Security

This Banking Malware Can Fake Calls From Your Bank
Import from wordpress feed
May 06, 2022
There’s a new strain of malware that specifically targets Android users that you should be aware of.  Dubbed simply “Fakecalls,” it is a banking trojan that boasts a powerful new ability we ...

See publication

Tags: Cybersecurity, Risk Management, Security

Large Company Snap-On Tools Recently Hit By Data Breach
Import from wordpress feed
May 05, 2022
If you have any tools in your garage, odds are good that at least a few of them are Snap-on tools.  The brand is ubiquitous in the United States and the company ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Edge Gets Overall Performance Boost
Import from wordpress feed
May 04, 2022
If you rely on Microsoft’s Edge browser to surf the web, you’re in luck.  The Redmond Giant has recently made some modifications to the browser’s “sleeping tabs” feature, which improves its overall ...

See publication

Tags: Cybersecurity, Risk Management, Security

HP Warns Users About Critical Security Vulnerability
Import from wordpress feed
May 03, 2022
Are you one of the legions of users who rely on the Teradici PCoIP client?  If so, be aware that whether you’re running Windows, Linux, or macOS, there’s a raft of new ...

See publication

Tags: Cybersecurity, Risk Management, Security

Windows 11 Will Soon Get New Security Features
Import from wordpress feed
May 02, 2022
If you’re a member of the Windows Insiders group, you may already be aware of this. If you missed the company’s announcement be on the lookout for some new security improvements in ...

See publication

Tags: Cybersecurity, Risk Management, Security

Sharkbot Malware Found In Several Android Antivirus Apps
Import from wordpress feed
April 30, 2022
If you own an Android device, odds are excellent that your go-to source for apps of any kind is the Google Play Store.  That includes antivirus apps to help keep your device ...

See publication

Tags: Cybersecurity, Risk Management, Security

VMWare Products Need Patched Now For Security Risks
Import from wordpress feed
April 29, 2022
If you use certain VMWAre products, be aware that the company has recently identified and issued a patch for a total of five critical security vulnerabilities. These are being tracked as: CVE-2022022954 ...

See publication

Tags: Cybersecurity, Risk Management, Security

Millions Of Cash App Users Had Their Data Breached
Import from wordpress feed
April 28, 2022
Do you use the popular smartphone app “Cash App?”  If so, you’re certainly not alone.  It is wildly popular and used by millions of people around the world. As one of the ...

See publication

Tags: Cybersecurity, Risk Management, Security

Cracked Software Downloads Are Spreading FFDroider Malware
Import from wordpress feed
April 27, 2022
There’s a new malware threat to keep an eye out for according to researchers from Zscaler.  Dubbed FFDroider, this one is known for hijacking a variety of social media accounts and stealing ...

See publication

Tags: Cybersecurity, Risk Management, Security

AMD Finds Issue That Causes CPU To Be Overclocked
Import from wordpress feed
April 26, 2022
Over the past few weeks, there’s been a bit of an uproar on various social media channels. Many AMD users are reporting inexplicable changes to their BIOS settings which users were never ...

See publication

Tags: Cybersecurity, Risk Management, Security

Apple Released Zero Day Hack Fix For Devices And Computers
Import from wordpress feed
April 25, 2022
If you’re an Apple user and you have an iPhone, a Mac, or both, you’ll want to grab the company’s most recent security update. The latest release pushes out fixes for a ...

See publication

Tags: Cybersecurity, Risk Management, Security

Essential Pillars of Trustworthy AI Building Pillar #1 Cybersecurity
LinkedIn
April 24, 2022
" We cannot realize the full potential of AI without building Trust in AI"

See publication

Tags: AI, Cybersecurity, Innovation

Upgrade Now To Fix iPhone Battery Issues
Import from wordpress feed
April 23, 2022
Do you have an iPhone?  If so, are you running IOS 15.4?  If you are, you may have noticed an unusual power drain on your battery that’s dramatically shortening the life per ...

See publication

Tags: Cybersecurity, Risk Management, Security

 Critical Security Issues Might Affect Many HP Printers
Import from wordpress feed
April 22, 2022
Do you have an HP LaserJet Pro, a Pagewide Pro, an OfficeJet, Enterprise, Large Format, or DeskJet printer at your home or in your office? If so, then be aware that your ...

See publication

Tags: Cybersecurity, Risk Management, Security

This New Malware Wants To Steal Your Data
Import from wordpress feed
April 21, 2022
A nasty new malware strain has recently been spotted in the wilds by researchers at zScaler. Dubbed “BlackGuard” the malicious code has been found on a variety of Russian underground Blackhat forums.  ...

See publication

Tags: Cybersecurity, Privacy, Security

This Android Malware Will Steal Your Facebook Credentials
Import from wordpress feed
April 20, 2022
Do you have an Android device?  Even if you don’t, you know someone who does. Google is incredibly good at spotting poisoned copies of apps on its Play Store and getting rid ...

See publication

Tags: Cybersecurity, Privacy, Security

Some Microsoft’s Source Code Was Stolen By Hacker Group
Import from wordpress feed
April 19, 2022
Microsoft recently confirmed that an account belonging to one of their employees was compromised by the Lapsus$ hacking group, which allowed them to abscond with portions of the company’s source code. Yes, ...

See publication

Tags: Cybersecurity, Privacy, Security

Some Microsoft Servers Are Experiencing DNS Problems After Update
Import from wordpress feed
April 18, 2022
Do you use Windows Server 2019?  If so, then you may be experiencing some issues as of the latest update. According to details published on the Windows Health Dashboard, customers who installed ...

See publication

Tags: Cybersecurity, Privacy, Security

Security Vulnerability Found In Wyze Security Cameras
Import from wordpress feed
April 16, 2022
Do you have a Wyze Cam?  If you’re not sure what that is, it’s an internet camera that offers a low-cost solution to those who are interested in playing around with video ...

See publication

Tags: Cybersecurity, Privacy, Security

One Click Default Browser Choice Coming To Windows 11
Import from wordpress feed
April 15, 2022
One of the latest revelations to come from the Windows 11 development team is that Microsoft is working on streamlining the process of setting a default web browser for Windows 11 users. ...

See publication

Tags: Cybersecurity, Privacy, Security

Chromebook Users Will Get New Tools And Features Soon
Import from wordpress feed
April 14, 2022
Do you own a Chromebook?  If so, be aware that version 100 of the Chrome OS and Chrome Browser boasts a new launcher.  Simply press the “Everything” button which is located on ...

See publication

Tags: Cybersecurity, Privacy, Security

Essential Pillars of Trustworthy AI: Dialog to Action Series
LinkedIn
April 13, 2022
There are models, frameworks, developing standards and policies for AI but unless we can make it actionable we are not going to be able to bridge the much needed gap of building Trustworthy AI.

See publication

Tags: AI, Cybersecurity, Innovation

Mobile Devices Connected To Windows Known As Phone Link
Import from wordpress feed
April 13, 2022
Microsoft recently announced that it was doing a bit of re-branding. The company’s apps that connect Android and iPhones to your Windows PC were formally called “Your Phone.” Under the new re-naming scheme, ...

See publication

Tags: Cybersecurity, Privacy, Security

Microsoft Help Files Are Being Used To Distribute This Spyware
Import from wordpress feed
April 12, 2022
Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing. Apparently, a group of hackers are trying a new approach to ...

See publication

Tags: Cybersecurity, Privacy, Security

Outlook Having PDF Preview Issues With Microsoft PowerToys
Import from wordpress feed
April 11, 2022
Do you use Microsoft PowerToys?  If you’re not sure what that is then you probably don’t. If you’re curious, Microsoft has an open-source set of tools called PowerToys which is designed to ...

See publication

Tags: Cybersecurity, Privacy, Security

Data Breach Announced At Popular Photo Site Shutterfly
Import from wordpress feed
April 08, 2022
Online photography platform Shutterfly is the latest high-profile company to fall victim to a hacking attack.  The company recently disclosed that in December of last year (2021) they were targeted by the ...

See publication

Tags: Cybersecurity, Privacy, Security

Fake Work From Home Opportunities Are Phishing For Data
Import from wordpress feed
April 07, 2022
It’s no secret that the pandemic changed the way much of the world works.  Tens of millions of people are now working from home with millions more eyeing that as a very ...

See publication

Tags: Cybersecurity, Privacy, Security

A Disguised Windows License Activator May Actually Be Malware
Import from wordpress feed
April 06, 2022
People who are in the habit of pirating movies and software have something new to worry about.  It seems hackers have begun targeting at least some of them with a ubiquitous form ...

See publication

Tags: Cybersecurity, Privacy, Risk Management, Security

Google Play Store Is Seeing More Trojan Style Malware
Import from wordpress feed
April 05, 2022
A security researcher who goes by the name “Dr. Web” has been tracking a suspicious increase in Trojan infiltration emanating from the Google Play Store. It is not currently known whether a ...

See publication

Tags: Cybersecurity, Privacy, Risk Management, Security

Automotive Part Maker Denso Is Latest To Have Data Breached
Import from wordpress feed
April 04, 2022
The automotive parts giant named DENSO is the latest corporation to fall victim to a hacking attack.  The company has offices all over the world and supplies parts to brands including General ...

See publication

Tags: Cybersecurity, Privacy, Risk Management, Security

 Secure Your SQL Server To Avoid This Malware Infection
Import from wordpress feed
April 02, 2022
Do you rely on Microsoft SQL and MySQL databases?  If so, be advised that the cybersecurity firm AhnLab recently published a report about a newly emerging threat. It seems that hackers are ...

See publication

Tags: Cybersecurity, Risk Management, Security

Email Phishing Attackers Are Pretending To Be The IRS
Import from wordpress feed
April 01, 2022
Emotet is in the news again according to the latest information from email security firm Cofense.  Emotet is notorious for spreading via phishing campaigns and this latest phishing campaign sees them impersonating ...

See publication

Tags: Cybersecurity, Risk Management, Security

File Explorer May Get Tabs In Windows 11
Import from wordpress feed
March 31, 2022
Are you a Windows Insider?  If so, be aware that the company is testing a “hidden” new feature you’re probably going to love. It’s a small change but its impact is enormous. ...

See publication

Tags: Cybersecurity, Risk Management, Security

 You May See Ads For Microsoft Products With Windows 11
Import from wordpress feed
March 30, 2022
Microsoft may have inadvertently signaled that they are soon going to reincorporate ads into Microsoft 11, which is going to please exactly no one. In the most recent Windows Insiders build, third ...

See publication

Tags: Cybersecurity, Risk Management, Security

Clipchamp Will Soon Replace Movie Maker For Windows 11
Import from wordpress feed
March 29, 2022
If you’re an early adopter playing with the Windows 11 builds as they come out and you are a “Windows Insider,” then you probably already know this. In the latest build, users ...

See publication

Tags: Cybersecurity, Risk Management, Security

Some AMD Ryzen CPU Users Experiencing Windows 11 Issues
Import from wordpress feed
March 26, 2022
Do you have a PC with an AMD Ryzen CPU?  If so, be aware that AMD has found an issue which causes “temporary pauses in system interactivity or responsiveness.” The issue affects ...

See publication

Tags: Cybersecurity, Privacy, Security

New Archive Feature Helps Mobile Users Save Space
Import from wordpress feed
March 25, 2022
The problem with smartphones is that they eventually run out of room.  Honestly it’s a wonder the issue isn’t even bigger than it is.  After all, miniaturization isn’t cheap but smartphone manufacturers ...

See publication

Tags: Cybersecurity, Privacy, Security

Hackers Get Source Code During Data Breach At Samsung
Import from wordpress feed
March 24, 2022
Samsung’s corporate network was breached recently.  That’s bad news all by itself. The company has recently confirmed that in addition to the confidential customer information that was stolen, the hackers also made ...

See publication

Tags: Cybersecurity, Privacy, Security

Hackers Are Increasingly Targeting Mobile Devices
Import from wordpress feed
March 23, 2022
Here’s a statistic you’re not going to like.  Based on research conducted by cybersecurity researchers at Proofpoint, there has been a staggering 500 percent increase in malware attacks against mobile devices during ...

See publication

Tags: Cybersecurity, Privacy, Security

Google Messages Users On Android Get New Features
Import from wordpress feed
March 22, 2022
Do you use Google Messages?  If so, there’s good news!  In recent months, the company has taken steps to bridge the Windows and iOS ecosystems the Android ecosystems and the iOS ecosystems. ...

See publication

Tags: Cybersecurity, Privacy, Security

This Popular Fitbit Watch Has Been Recalled
Import from wordpress feed
March 21, 2022
Do you own an Ionic smartwatch?  If you haven’t heard yet, be advised that Fitbit has issued a voluntary recall of the devices produced between 2017 and 2020. It’s also worth mentioning ...

See publication

Tags: Cybersecurity, Privacy, Security

These Medical Devices Are Vulnerable To Security Threats
Import from wordpress feed
March 19, 2022
Thanks to the fine folks at Palo Alto Networks we have a better view of the relative safety and security of network-capable medical devices.  Unfortunately, the news is grim. Based on their ...

See publication

Tags: Cybersecurity, Privacy, Security

People Are Still Not Using Secure Passwords Despite Warnings
Import from wordpress feed
March 18, 2022
It’s 2022 and after years of warning people repeatedly about the dangers of using the same old passwords and using the same password across multiple websites, you would think this would get ...

See publication

Tags: Cybersecurity, Privacy, Security

Network Security Breach Confirmed At Nvidia
Import from wordpress feed
March 17, 2022
Nvidia joined the seemingly unending parade of major corporations to fall victim of a hacking attack.  Recently, a group of hackers calling itself “Lapsus$” began sharing details about the incident and the ...

See publication

Tags: Cybersecurity, Privacy, Security

Chip Makers Are Already Planning For WiFi7
Out Secure Inc
March 16, 2022
We barely got to know Wi-Fi 6 but companies like Qualcomm are already making plans for the next generation of Wi-Fi technology. They are working on Wi-Fi 7 which is otherwise known as 802.11.

Granted, the new standard is a long way from being ready to roll out, so don’t expect to see any equipment on the market that’s capable of supporting it until late 2024 or early 2025.

See publication

Tags: Cybersecurity, Risk Management, Security

Android Users Need To Watch Out For Teabot Trojan
Import from wordpress feed
March 15, 2022
If you have smart devices in the Android ecosystem, there’s a new threat to be aware of in the form of a malware strain called Teabot.  This bit of malicious code is ...

See publication

Tags: Cybersecurity, Privacy, Security

Scammers Cost Americans Billions Of Dollars In 2021
Import from wordpress feed
March 14, 2022
The US Federal Trade Commission reports that Americans lost almost six billion dollars to fraud last year.  The $5.8 billion total represented a catastrophic 70 percent increase compared to the losses reported ...

See publication

Tags: Cybersecurity, Privacy, Security

New Phishing Emails Target Citibank Account Holders
Import from wordpress feed
March 12, 2022
Are you a Citibank customer?  If so, be aware that a group of scammers is specifically targeting Citibank account holders. The campaign is incredibly convincing, and the emails look just like official ...

See publication

Tags: Cybersecurity, Privacy, Security

Malware Hidden Inside Games Found In Microsoft Store
Out Secure Inc
March 11, 2022
Security experts tell people all the time to never to download apps from anywhere other than official sources like the Microsoft Store, the Google Play Store, and the Apple App Store.

See publication

Tags: Cybersecurity, Risk Management, Security

Employee Information Was Leaked At Cookware Company Meyer
Import from wordpress feed
March 10, 2022
Meyer Corporation is a California-based company and a giant in the cookware industry. Meyer is the latest victim in a seemingly never-ending parade of hacking attacks. The full extent of the attack ...

See publication

Tags: Cybersecurity, Privacy, Security

New iOS 15.4 Update Addresses AirTag Stalking Issue
Import from wordpress feed
March 09, 2022
Apple AirTags are handy.  They’re an incredibly convenient way to help keep track of your stuff. If you lose something that has been tagged you can easily locate it using the “Find ...

See publication

Tags: Cybersecurity, Risk Management, Security

 Skype Gets New 911 Calling Feature In The U.S.
Import from wordpress feed
March 08, 2022
Recently, Skype announced a change to its 911 calling feature.  Previously the feature was only useable in the UK, Finland, Denmark, and Australia. Now, the company has unlocked it for the United ...

See publication

Tags: Cybersecurity, Risk Management, Security

Zoom Bug With Some Macs Leaves Microphone On After Meetings
Import from wordpress feed
March 07, 2022
If you’re a Mac user and you also use Zoom be sure to check to see what version of Zoom you’re running.  Recently a bug in the Mac version of the software ...

See publication

Tags: Cybersecurity, Risk Management, Security

Cybersecurity, 5th Dimension in Warfare: A Strategic Approach Series #3 AI, Ethics Lethal Autonomous Weapon Systems, AWS
LinkedIn
March 06, 2022
The IAI Harop is a loitering kamikaze munition developed by the MBT division of Israel Aerospace Industries. It is an anti-radiation drone that can autonomously home in on radio emissions and can attack targets by self-destructing into them. The drone can either operate fully autonomously, using its anti-radar homing system, or it can take a human-in-the-loop mode. If a target is not engaged, the drone will return and land itself back at base.

See publication

Tags: AI, Cybersecurity, Security

Windows 11 Is Now Able To Run Some Android Apps
Import from wordpress feed
March 05, 2022
Recently, Microsoft announced that they were adding support for Android Apps to Windows 11.  The company first began testing that new functionality back in October of last year (2021). Now, the public ...

See publication

Tags: Cybersecurity, Risk Management, Security

Update This WordPress Plugin Immediately To Prevent Security Risks
Import from wordpress feed
March 04, 2022
Do you have a WordPress site?  Do you use the PHP Everywhere plugin? If so, you’re not alone.  More than 30,000 site owners have installed it.  It’s an excellent plugin that dramatically ...

See publication

Tags: Cybersecurity, Risk Management, Security

Puma Sportswear Recently Impacted By A Data Breach
Import from wordpress feed
March 03, 2022
We have recently learned that Puma Sportswear was impacted by a data breach in the waning days of 2021. It’s important to note that Puma’s networks were not attacked directly.  The attack ...

See publication

Tags: Cybersecurity, Risk Management, Security

Microsoft Teams Gets Optimizations To Use Less Resources
Import from wordpress feed
March 02, 2022
Do you use Microsoft Teams and do you have an older PC that struggles with Teams video meetings?  If so there’s good news.  Microsoft has recently upgraded Teams and halved the power ...

See publication

Tags: Cybersecurity, Privacy, Security

Medusa Android Banking Trojan Steals Sensitive User Information
Import from wordpress feed
March 01, 2022
There are two new forms of malware spreading rapidly among people with Android devices according to researchers at ThreatFabric. This latest campaign involves the FluBot malware (also known as Cabassous) and the ...

See publication

Tags: Cybersecurity, Privacy, Security

Malware Disguised As Windows 11 Upgrade Targets Windows 10 Users
Import from wordpress feed
February 28, 2022
According to researchers at HP, there’s a new threat to worry about.  Hackers have recently begun disguising malware as Windows 11 upgrades and are using them to target Windows 10 users who ...

See publication

Tags: Cybersecurity, Privacy, Security

The San Francisco 49ers Recently Hit With Ransomware Attack
Import from wordpress feed
February 26, 2022
Hackers will attack absolutely anybody.  No one is safe and nothing is sacred.  Not even football is safe. The most recent high-profile attack was made against the San Francisco 49ers according to ...

See publication

Tags: Cybersecurity, Privacy, Security

iPhone Sales Edging Out Android In The US
Import from wordpress feed
February 25, 2022
It’s no secret that supply chain issues have impacted a variety of different industries.  Apple has been somewhat less impacted than others. Leveraging this and their massive infrastructure and marketing budget, they ...

See publication

Tags: Cybersecurity, Privacy, Security

Hackers Are Using NFT Excitement To Trick Users
Import from wordpress feed
February 24, 2022
Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage.  Everyone is talking about them, and many are excited about ...

See publication

Tags: Cybersecurity, Security

Hackers Are Breaking Into Microsoft Teams And Dropping Malware
Import from wordpress feed
February 23, 2022
Researchers at Avanan are a Check Point subsidiary. They have recently issued a warning that anyone who uses Microsoft Teams should be aware of. According to the latest statistics, more than 270 ...

See publication

Tags: Cybersecurity, Privacy, Security

Hackers Are Setting Their Sights On Linux Systems
Import from wordpress feed
February 22, 2022
For most of the history of the internet Linux has been able to stay below the radar of hackers around the world. While there have been some attacks that specifically targeted Linux ...

See publication

Tags: Cybersecurity, Privacy, Security

New Malware Is Using CSV Files To Infect Users
Out Secure Inc
February 21, 2022
Researchers have spotted a new phishing campaign you should be aware of.

What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect machines. They are installing the BazarBackdoor malware. If you’re not familiar with the term CSV stands for “Comma Separated Values” and it’s a text file format that can be loaded into Excel.

See publication

Tags: Cybersecurity, Risk Management, Security

Last Year Microsoft Blocked More Than 25 Billion Hacker Attacks
Out Secure Inc
February 19, 2022
Individual users often don’t have a good sense of the scope and scale of hacking attacks around the world. The numbers may shock you.

See publication

Tags: Cybersecurity, Privacy, Security

More Scammers Are Using Social Media To Target Victims
Import from wordpress feed
February 18, 2022
An increasing number of scammers are using social media to target victims and relying on social engineering tricks to convince people to part with their personal information or money.  The problem has ...

See publication

Tags: Cybersecurity, Privacy, Security

Microsoft Defender Adds Cross Platform Mobile Protections
Import from wordpress feed
February 17, 2022
Microsoft recently announced an important upgrade to Microsoft Defender. It now supports vulnerability management for both Android and iOS. The company’s announcement reads in part as follows: “With this new cross-platform coverage, ...

See publication

Tags: Cybersecurity, Privacy, Security

Mac Malware Is Becoming A Bigger Threat For Users
Import from wordpress feed
February 16, 2022
In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn’t all that worrisome.  It stole system information but it was by no ...

See publication

Tags: Cybersecurity, Privacy, Security

Additional Security Recently Added To Office 365
Import from wordpress feed
February 15, 2022
Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a bid to ...

See publication

Tags: Cybersecurity, Privacy, Security

New Android Malware Steals Data And Factory Resets Phones
Import from wordpress feed
February 14, 2022
BRATA malware was first spotted in the wilds by Kaspersky back in 2019. Its earliest incarnation saw it targeting e-banking users and it was designed to steal banking and login credentials of ...

See publication

Tags: Cybersecurity, Privacy, Security

Suspicious Files Get New Warnings In Google Drive
Import from wordpress feed
February 12, 2022
If you have Google Drive, there’s good news.  The company has recently announced that soon they’ll be rolling out a new feature to help alert users to the presence of suspicious documents. ...

See publication

Tags: Cybersecurity, Privacy, Security

High Profile Instagram Accounts Being Held For Ransom By Hackers
Import from wordpress feed
February 11, 2022
Hackers have recently hit upon a new money-making scheme.  Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those accounts hostage ...

See publication

Tags: Cybersecurity, Privacy, Security

Dark Herring Subscription Scam Affected Millions Of Android Users
Out Secure Inc
February 10, 2022
Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google’s nose for nearly two years.

See publication

Tags: Cybersecurity, Privacy, Security

Apple Released A Fix For Multiple Zero Day Exploits
Out Secure Inc
February 09, 2022
There’s good news for Apple users.

The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited by hackers to cause no end of trouble to anybody running macOS or iOS.

The first Zero-Day addressed is being tracked as CVE-2022-22587 and is a nasty

See publication

Tags: Cybersecurity, Privacy, Security

Android Apps Are Coming To Windows 11
Import from wordpress feed
February 08, 2022
One of the most persistently frustrating aspects of our highly interconnected world is that we seem to exist in at least three different distinct ecosystems. Apple users live in the Apple ecosystem ...

See publication

Tags: Cybersecurity, Privacy, Security

E-Mail From Department Of Labor Could Be Phishing Attack
Import from wordpress feed
February 07, 2022
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template that does ...

See publication

Tags: Cybersecurity, Privacy, Security

Vulnerability In This Cisco Software Could Allow Hackers Access
Import from wordpress feed
February 05, 2022
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS.  The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any ...

See publication

Tags: Cybersecurity, Privacy, Security

This Plugin Could Put Your WordPress Site At Risk
Import from wordpress feed
February 04, 2022
The WP HTML Mail plugin has been installed on more than 20,000 websites. If you’ve built a WordPress site for your business and you use that plugin,  be aware that you are ...

See publication

Tags: Cybersecurity, Privacy, Security

Support Comes To An End For iOS 14 For iPhone Devices
Out Secure Inc
February 03, 2022
When Apple first released iOS 15 they posted a promise on their website. That promise was: “If you’re using iOS or iPadOS 14.5 or later, you might now see the option to ...

See publication

Tags: Cybersecurity, Privacy, Security

Top 10 Brands That Phishing Attackers Use To Scam Users
Out Secure Inc
February 02, 2022
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the highest bidder ...

See publication

Tags: Cybersecurity, Privacy, Security

Apple Safari Bug May Leak Personal Information And History
Import from wordpress feed
February 01, 2022
There was a recently discovered issue with the way the IndexedDB API was implemented in Safari’s WebKit engine. This is giving IT professionals who work in an environment dominated by Apple products ...

See publication

Tags: Cybersecurity, Privacy, Security