If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.
09/25/2017 08:08 PM EDT Original release date: September 25, 2017
Apple has released security updates to address vulnerabilities in multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
US-CERT encourages users and administrators to review Apple security pages for the ...Continue Reading →
09/12/2017 05:26 PM EDT Original release date: September 12, 2017
US-CERT is aware of a collection of Bluetooth vulnerabilities, known as BlueBorne, potentially affecting millions of unpatched mobile phones, computers, and Internet of Things (IoT) devices. A remote attacker could exploit several of these vulnerabilities to take control ...Continue Reading →
October is Cybersecurity Awareness Month, and this week’s theme is Simple Steps to Online Safety.
The toughest part of cybersecurity is securing the human mind, emotions, behaviors, and responses from the making a decision or taking an action that will open the door for a cyber-attacker. The reality is that it is much easier to secure systems than humans. And unfortunately, humans have been given a ...Continue Reading →
Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne. This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.
This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices. Once installed, the attacker has full control of ...Continue Reading →
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera feeds ...Continue Reading →
As we have discussed in previous posts, the benefits of 2FA are that your account cannot be breached with only a stolen password. In addition to the password, a one-time passcode is required to ...Continue Reading →