Introduction Over 7B smartphones are in use today. Over half of the workforce have company programs on their phone, whether...
Bring Your Own Device Means Bringing Extra Security
Introduction Security experts tend to toss about the advice: Don’t mix work and personal business, devices or information!...
Met Your Valentine Online? Have a Cyber-Safe Date!
Introduction Have you ever downloaded a dating app? Slid into someone’s DMs on social media? Made a dating profile on a...
Double Clickjacking, Toil and Trouble!
Introduction You may have heard about clickjacking before…but what about DOUBLE clickjacking? The same threat has evolved...
New Ransomware Targets Amazon AWS
Introduction Do you use Amazon Cloud Storage? Amazon S3? If these names sound familiar, then you know about Amazon Web...
U.S. Executive Order On A.I., the Environment, and Cybersecurity
Introduction Less than a week before the next U.S. presidential inauguration, President Biden signed an executive order....
Is There A Hacker In Your Smartphone?
Introduction Do you have a smartphone on you right now? If you’re like 4.88B others, then you absolutely do! In fact,...
Are Your Social Media Profiles Secure?
Introduction When you join a new social media platform or create a new account, what’s the first thing you do? Hopefully,...
Is It a Crock to Call Crypto Cash?
Introduction Did you hear? A Washington couple is suing Safeco Insurance Co. for refusing to cover $600,000 worth of...