Why Hardware Encryption is Not Secure

A Little History In the past it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still...

Murder by Hacking

When Hackers Kill Hackers have already - perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has...

What is Zerodium?

Zerodium is a reputable place where you can sell zero day exploits. Hackers and security researchers know that Zerodium is a way to cash in...

CASP vs. CISSP – My Experience

I decided to take the CASP exam for only one reason... There is really only one reason that I originally took the CASP exam instead...

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The "group" has been around since 2017 and they have been observed targeting social media accounts.  Specifically,...

How I passed the CISSP exam without reading any books

Reading is not my learning style. In today's world of podcasts and audio books I believe that less and less people are accustomed to learning...

Why hackers love patching

When a company issues a patch to fix security issues the bad guys start salivating.  They know that in many cases they now have...

Phishing attacks up by 300% in 2018

According to "The Retail and eCommerce Threat Landscape Report" from October 2018 there is a 297% increase  in the number of phishing websites that...

More data shows that Americans are lackadaisical about security.

A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers...

North Korean Cryptocurrency Scam Efforts – Marine Chain

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea's burgeoning cyber military seems to...

The freeRTOS Vulnerability Disaster

FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in many IOT hardware products has newly identified vulnerabilities. The vulnerabilities...

City of Westhaven Connecticut Pays $2K in Ransomware Extortion

Another successful ransomware attack.... The City of West Haven, Connecticut made the tough decision to pay hackers $2,000 in ransom money after a ransomware attack...

Hackers are Unstoppable?

According to research by Kaspersky Lab, 86% of Cybersecurity professionals think that hackers are not stoppable and will eventually succeed at compromising the systems...

The Most Frequent Kinds of Malware

Malware is short for "Malicious Software" and has been around for a very long time.  Way back in the 1980s trojans and other types...

What is Coinhive Malware?

A cryptocurrency mining code called Coinhive is creeping onto unsuspecting websites around the net. Coinhive uses javascript to harness computer users CPU capacity when they...

The Bloomberg article about Supermicro Supply Chain Hardware Hack

Everyone is talking about the Bloomberg Businessweek's volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report...

Every day we hear about new security breaches. Why don’t...

There are high profile Cyber Security breaches almost Daily Cybersecurity breaches seem to be a Continuous part of modern life, With a new high-profile leak...