Watering Hole Attacks: The Tainted Oasis

Author(s):

Josh Henry, ,

Antelopes at a Watering Hole in the desert drinking

Watering Hole Attacks: The Tainted Oasis Watering hole attacks are still wreaking havoc on targeted groups and institutions around the globe. These attacks target major corporations and financial institutions. However, now they are penetrating these corporations’ servers by trapping a single user. The Name In the wild, there are many predators that lurk in the … Read more

App Access: Life Invasion

Author(s):

Josh Henry, ,

Guy in front off computer with app access

Life Invasion: Your Privacy A problem that has been occurring for years is finally generating concern. 77% of Americans own smart phones. Majority of those people make the mistake of allowing apps such as Facebook to gain access to their camera roll. It all seems innocent until your private photos start trending and get into … Read more

The Dark Side of AI

Author(s):

Josh Henry, ,

AI The Dark Side of AI, Artificial Intelligence, AI concept, Brain on motherboard

The rise of AI is as inevitable as the next data breach.  The 21st century has seen a massive resurgence in highly advanced AI usage techniques. We can now process large amounts of data in a short amount of time. We can use machine learning to help machines improve on their mistakes. In fact, we … Read more

Equifax was Careless With Your Data

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Josh Henry, ,

Data breach and private personal information theft as a technology security concept as a digital thief stealing code as a computing risk idea in a 3D illustration style. Equifax

The Cost of Carelessness Is it possible to quantify carelessness? Recent news about Equifax has shown the veracity of carelessness seen in the cybersecurity department of major corporations and countries. This year alone, we have seen many companies that we trust with our personal information fail us. Because of this, the catastrophic failures of cybersecurity … Read more

Cybersecurity Market: Trending Upwards

Author(s):

Josh Henry, ,

Cybersecurity Market coins in front of graph

Rising Cybersecurity Market Trends      The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the demand for professionals in the cybersecurity market field is rapidly growing According to an article from Cybersecurity Ventures, the estimated … Read more

Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

Malicious Apps: For Play or Prey?

Author(s):

Josh Henry, ,

Malicious Apps, hand holding phone with a warning sign on it, red background

Malicious Apps Today’s society is adapting to excessive use of cell phones and personal data stored in them. Federal laws have been changed to protect citizens from police authorities rummaging through our cell phones without the proper documentation. Considering that criminals have much less trouble adapting than lawmakers, they are usually one step ahead and … Read more

IOT Devices- Information Outsourcing Terror

Author(s):

Josh Henry, ,

Iot Device Alexa against a blue background, speech bubble with gears.

IoT Devices are on the Rise A rising trend in consumer markets today are the virtual assistant such as Amazon’s Echo or the Google mini. Juniper Research predicts that 55% of homes in the U.S. will feature an IOT device by 2022. This ushers in a debate regarding the privacy and security of your information. … Read more