howto | October 7, 2020
Fighting fake newsWhat is Fake News? Generally speaking, fake news is a false narrative that is published and promoted as if it were true. Historically, fake news was usually propaganda put out […]
howto | October 7, 2020
Fighting fake newsWhat is Fake News? Generally speaking, fake news is a false narrative that is published and promoted as if it were true. Historically, fake news was usually propaganda put out […]
General Education | August 10, 2019
Do you actually have backups?If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. […]
news | July 26, 2019
Ransomware causing power outagesA ransomware infection at an electricity provider in the city of Johannesburg, South Africa’s biggest city and financial capital, has left some of its residents without power. The ransomware infection […]
General Education | July 3, 2019
Why use a VPN (Virtual Private Network)?You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee shop, […]
General Education | June 27, 2019
“File Deletion” Alert Becomes the Latest Scam to Compromise Office 365 CredentialsAttackers use simple cause for concern as the basis of a scam intent on tricking victims into offering up their Office 365 credentials. A very official-looking email is making the […]
news | June 24, 2019
Florida City Police Dept User Who Falls for Ransomware Attack Causes $600k in Ransomware PaymentIt was all over the press, and even made it in the New York Times: “The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary […]
news | June 24, 2019
The U.S. Launched A Cyber Attack On Iran, And We’re Expecting Spear Phishing Strike BacksThe tension in the Middle-East apparently prompted a game-changing move by the U.S. President. Washington Post sources say exactly 10 years after Stuxnet, the President approved a cyberattack that took […]
Uncategorized | May 8, 2019
Hackers are Being Bombed NowThe Israeli Defense Force (IDF) bombed a building it said housed Hamas cyberspecialists who had attempted to launch an attack that Israeli forces thwarted. The air strike is believed to […]
Uncategorized | May 2, 2019
How Attackers Bypass Multi-Factor Authentication (MFA)Ken May is the CEO of Swift Chip, a SoCal-based MSP with a strong focus in cybersecurity. Mr. May is also a Community Instructor for SANS, teaching their GSEC and GPEN courses. IT security tactics are […]
Uncategorized | April 9, 2019
Hackers Can Bypass 2FAThese latest attacks are designed to proxy login requests that incorporate SMS-based authentication as a way to seamlessly bypass 2FA protection without being noticed. Google researchers are seeing more phishing […]