Vulnerability News

Technology Planning 2020 Webinar

Welcome Webinar Attendees! You can download the deliverables by clicking on the link below. Boilerplates/Handouts Click here to download files.        

2020 Technology Planning Webinar

Thanks for being interested in our Technology Planning Webinars! This year‘s annual webinar on the subject will include a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent virt...

Cyber Attacks Rise Due To COVID-19

Nearly half of all companies expect a security issue due to telecommuting… An article review. A few months ago we discussed a warning from the Department of Homeland Security regarding hackers taking advantage of the business disruptions caused by COVID-19, and a...

Zoom Security: No longer an Oxymoron

Lessons Learned from Zoom’s Rise… The only constant is change. An illustration of impermanence in information security. Zoom’s popularity is in a large part thanks to its ease of use and low cost. How can you go wrong with an application that is popular, co...

New Ransomware Hides in a Virtual Machine

Hiding in a VirtualBox VM, the new Ragnar Locker ransomware is currently undetectable… An article review. Ransomware and other malicious programs often utilize techniques to evade detection by security software, but a newly discovered piece of ransomware has rais...

Experts Warn of Attacks on Telecommuters

As more offices rely on working remotely, hackers are working to take advantage… An article review. As concerns over the coronavirus continue to mount, more Americans than ever are working remotely from their homes…and hackers are looking to take advantage ...

Malicious Browser Extensions Impact Millions of Users

500 malicious extensions with millions of users were recently removed from Chrome… An article review. If you’ve been using the internet for a long time, you may remember when it seemed like every organization and service offered a toolbar for users.  While ...

The Threat From Within

One of the biggest data security threats you face comes from inside… An article review. We spend a lot of time thinking about the threats to our network posed by hackers: from ransomware and phishing scams to data breaches, we often view the culprit as being some...

Senators Raise Questions About Ring

Recent revelations are a reminder of the risks associated with networked devices… An article review. Networked video surveillance products have exploded in popularity in recent years, thanks to a new generation of lightweight, battery-powered cameras and easy to u...

FBI Issues New Ransomware Warning

Several New Targets For Ransomware Have Been Identified… An article review. Over the last couple of years we’ve discussed the threat posed by ransomware several times, and for good reason: it’s now the most common type of cyber threat for both businesses and indi...