Time to Panic? Potential Wi-Fi Security Breach Uncovered

Submitted by Micah Smith on Tue, 10/17/2017 - 17:56

According to some recent reports, millions of Wi-Fi users around the globe might be twitching. Hot off the press, the security protocol protecting the majority of modern Wi-Fi networks, WPA2, has been cracked.

This means that traffic shared over countless wireless networks globally will become an easy target for hackers and other malicious users looking to obtain sensitive information.

Biggest Internet Security Threat Ever?

Accenture and the Amazon S3 Bucket

Submitted by Micah Smith on Fri, 10/13/2017 - 16:44

Data leaks into leading international businesses are becoming less of an irregularity and more of a frequent tech faux pas.

The cyber criminals are at it again, snubbing monster Tech companies with their hacking skills with the most recent and all too public Amazon S3 bucket breach.  Lucky for us, we all now have a greater understanding of both S3 Amazon buckets and IT choices that need to be taken by Accenture and other corporate entities.

The aftermath of Equifax

Submitted by Micah Smith on Tue, 09/19/2017 - 08:31

As the news of the Equifax hack exploded and Equifax attempts to clear up the spill, the experts are slowly starting to gather emerging data of the damage and real-time consequences. Unfortunately, as we begin to push aside a lot of media hype and name-calling, we aren’t that much closer in understanding the significance of what happened.

The Equifax Storm

Submitted by Micah Smith on Wed, 09/13/2017 - 07:24

Whilst everyone has been watching Hurricane Harvey take on Texas and Irma batter Florida, in the same way one might watch a train crash, other extremely important events have been playing out.

These events have aftershocks for the financial markets and ripple effects in practically every sphere of life. In short, there could be chaos at a biblical level on the way, very shortly, and our best minds need to start working fast on maximal damage control.

Cyber Fraud in the Cloud.

Submitted by Micah Smith on Wed, 07/05/2017 - 11:16

The trend towards purchasing less physical space and more virtual space is moving at break-neck speed and becoming increasingly relevant to businesses every single Nano-second.

Hacking the United Kingdom

Submitted by Micah Smith on Wed, 06/28/2017 - 11:11

Just a few days after the world learned that multiple email passwords of MPS from the UK Parliament were being traded by Russian hackers online, we learned of an attack on the UK Parliament!

Coincidence? Although drawing a link between these two seemingly disconnected events appears a little conspiratorial, the flagrant possibility of a connection clearly exists.

Petya Ransomware attack is happening again

Submitted by James Azar on Tue, 06/27/2017 - 11:08

It wasn’t long ago that people were scrambling to retake control of files encrypted by “wannacry” ransomware, today Europe was taken over by a close relative of “wannacry”. Many major organizations are reported to be victims of this cyberattack.

A few notes about this recent attack:

Email Hoaxes, everyone is at risk.

Submitted by Micah Smith on Mon, 06/26/2017 - 10:57

It's Tuesday and you are out for lunch with a good friend who is relaying his recent good luck, he tells you he is about to be a multi-millionaire. He transferred his entire savings to a Mrs. X on the other side of the globe and she is going to give him a percentage of her massive inheritance, from a wealthy land-owning father.

At this point, most people would make a quick exit to the bathroom and stare blankly at the mirror wondering how their dear friend could be such a moron.

Mееt the Hacker who just hit puberty, Ahѕаn Tаhіr.

Submitted by Micah Smith on Thu, 06/22/2017 - 10:54

Hacking rерrеѕеntѕ аn іntеrеѕtіng conflict оf interest in thе tесh wоrld: оn the one hand it іѕ thе dreaded buzz word, the bаnе of life posing a mаjоr thrеаt to іmроrtаnt data, security and personal identity, whіlst оn the other іt іѕ used еxtеnѕіvеlу tо mаіntаіn ѕесurіtу аnd роѕіtіоn bу numеrоuѕ fіrmѕ.

Hасkіng іѕ a great аltеrnаtіvе tо cracking аѕ hackers are by and large paid fоr their ѕеrvісеѕ and there is a healthy level of competition and challenge against the сrеаtоrs and developers оf thе рrоgrаm уоu are trying to hack into.

Yellow Dot Spy Code.

Submitted by Micah Smith on Thu, 06/08/2017 - 10:41

Your Printer Could Be Spying on You!

Reality Winner, A 25-year-old federal contractor now charged with the leaking of a report on Russian military hackers, just before the US elections, may be a household name in all America following the news of her alleged leakage of National Security Agency’s (NSA) classified information.

Such revelations surface at a time when the Russian president, Putin denied any State involvement. Russia stood accused of interfering with USA election systems, contributing to President Trump’s victory.