Get Our Weekly Blog Sent Straight to Your Inbox
Windows Security Flaw gets Perfect Score
Microsoft Windows is no stranger to security flaws. Researchers at Check Point Security recently discovered a critical vulnerability that has existed as far back as 2003. The vulnerability, known asRedSig, impacts Windows DNS Servers and is so bad it...
Another Critical Vulnerability in Zoom (Security Layers FTW)
The hits just keep on coming for Zoom teleconferencing this year as a new critical vulnerability was disclosed late last week. This is, of course, in addition to the other two critical vulnerabilities that were disclosed last month, as well as the...
Growing Cybersecurity Trends in 2020
It’s a year that will never be forgotten – the year that will forever go down as one of the “worst years ever.” Sure, that might be a little dramatic, but we can all agree it has been an interesting roller coaster of events. One event we're seeing is...
CCPA Compliance and What This Means for You
On June 28th, 2018, California signed a new law called the California consumer privacy act (CCPA), which went into effect on January 1st, 2020. On July 1st, 2020 this law went into its enforcement phase. What this entails is that California's Attorney...
Time’s Up, TikTok: The Hidden Security Risks
I’m sure you’ve all heard of the social media app, TikTok, by now, yeah? Even if you don’t have the app on your phone or you don’t know much about it, you’ve probably heard of others using it or you’ve seen the videos popping up left and right on your...
The Online Youth: How Risk-Aware Are They?
In the past, this article has been more technically focused. For this article, I decided to take a different approach. In the IT Security field, we stay pretty plugged into the technical community. Most of us have our favorite articles or publication...
An Apple a Day Keeps the Hackers Away
In recent weeks, Apple has announced its bold new security move that will have a positive security impact on everyone. This new security move will be changing how we access our browser and will essentially boost security for all its users – which is...
Staying One Step Ahead of Mobile Security Threats
What’s one of the first things you do when you wake up? A high percentage of individuals will answer “check my phone, “or “check my email,” which is inevitably linked to their mobile device anyway. We get it – it’s easy, andit’sway more convenient than...
UPnP Devices at Risk from New Vulnerability
Universal Plug and Play (UPnP) has been a security nightmare since its inception over a decade ago. This technology is generally found in consumer-grade networked devices and allows them to discover other UPnP devices automatically on the network to...
A Deeper Look Into “Zero Trust” Security Strategy
What exactly is a Zero Trust security strategy? In general, this strategy simply means that not one person is trusted by default to access your secured network – no matter how high up they may be in the company – secured verification is required 24/7 in...
Newest Player in the Ransomware Game, Netwalker, Targets Universities
Over the past few weeks, there have been attacks carried out against universities in the united states where the attackers have been successful in stealing unencrypted data and then encrypting the university computers for ransom. The data taken from...
Back to the Basics: Security 101
Over the past few months, there has been much talk about COVID-19 and what it means for businesses with employees working from home. Today, I thought I would change it up and get back to the basics of cybersecurity to talk about a type of attack that is...