GlueBall Vulnerability (CV-2020-1464)
Microsoft finally patched a zero-day that has existed for years named “GlueBall” (CV-2020-1464: Windows Spoofing Vulnerability). A spoofing vulnerability exists when Windows incorrectly validates file
Microsoft finally patched a zero-day that has existed for years named “GlueBall” (CV-2020-1464: Windows Spoofing Vulnerability). A spoofing vulnerability exists when Windows incorrectly validates file
During the COVID-19 Pandemic, many companies have been required to set-up their employee base to work remotely. This includes not only employees, but also contractors,
Antivirus software is designed to detect and remove malware; malware is the broad term used to describe all kinds of malicious or unwanted code. Antivirus solutions
What is Ransomware. Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore
In the days following the latest Facebook scandal, in which we learned that Cambridge Analytica collected and misused the personal data of potentially 50 million
Extreme Weather WILL happen. Cyber Attacks WILL happen. WILL You be Prepared WHEN they strike?? In this blog, I compare cyber threats and natural disasters
The implementation deadline for the European Union General Data Protection Regulation (GDPR) is coming soon. Most of us in the US are probably not yet
I run a small US-based business. I don’t see GDPR ever applying to my company. Can I just ignore it? Our clients and business partners
[et_pb_section fb_built=”1″ admin_label=”section” custom_padding=”19px|0px|54px|0px”][et_pb_row admin_label=”row” custom_padding=”0px|0px|27px|0px”][et_pb_column type=”4_4″ parallax=”off” parallax_method=”on”][et_pb_text admin_label=”Text”] On May 12, hackers launched a global ransomware attack that takes advantage of a known
A practical understanding of the Cybersecurity Act of 2015, with information security and privacy implications for Contractors. As part of the $1.1 trillion omnibus