Featured Blogs
Casino’s High-Roller Database Compromised by a Single IoT Thermometer
It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Parasitic Coin Mining Creates Wealth, Destroys Systems
The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...
DNS – the Blind Spot in Your Security Ecosystem
It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check,...
Group Chat Etiquette: 10 Tips to Help Your Family Navigate the Digital Chatter
Technology is touching and transforming nearly every area of our lives, especially our relationships. Group chat, for instance, is replacing...
Teen Gaming, Cybersecurity Specialist Training
Many of us parents have a love/hate relationship with teen gaming. While it seems to cast a spell over many...
Is your password up to snuff?
Everything from social media to banking is protected by a password. But what happens when an expert password cracker targets...
MyFitnessPal, Panera Bread, Saks Fifth Avenue: What to Know About the Recent Data Breaches
This blog has been updated as of 4/4. Practically everything has become digitized in 2018. We’ve developed thousands of health...