All Voting App Software can be Hacked: Iowa is Only the Tip of the Iceberg

Yes, I know. As of this writing, the Iowa Democratic Party and some other experts are saying that no hacking probably occurred during the Iowa Caucus. Well, what do you expect them to say? But, as everyone in cybersecurity knows, the easiest way into a network is to hack one of its endpoints. Giving out … Continue reading All Voting App Software can be Hacked: Iowa is Only the Tip of the Iceberg

Disturbing Hacks Demonstrated at Recent Hacking Competition

Pwn2Own is the name of a hacking contest where teams of participants demonstrate their hacking skills by finding vulnerabilities in well-known devices and software. Winners get to keep the devices they hack plus a cash prize. For the companies who produce the devices and software, it's a bargain. They get the best hackers to find … Continue reading Disturbing Hacks Demonstrated at Recent Hacking Competition

Trump, Biden, and the Recent Hacking of Burisma Gas

When investigating any breach, it's important to keep an open mind and not reach any conclusions before all the facts are in. This is especially true when investigating the Burisma Holdings breach because of the political ramifications linked to the company. For anyone out there who is still not aware, Burisma is the Ukrainian oil … Continue reading Trump, Biden, and the Recent Hacking of Burisma Gas

Package Scams: Free Packages, Fake Packages, and Illegal Packages Scam the Unwary

Package scams are nothing new. They've been around since people started buying merchandize on the internet. Recently, however, these scams have been getting more sophisticated and much harder to spot. The following scams are ones that have recently seen a rise in victims. The Free Package from Amazon Scam How can getting a free package … Continue reading Package Scams: Free Packages, Fake Packages, and Illegal Packages Scam the Unwary

Take the Iranian Cyber Threat Seriously

Many people fear that the death of Iranian General Qassim Suleimani could lead to a cyberwar between the U.S. and Iran. To those I say; where have you been for the past two years? In May of 2018, I predicted the beginning of the first world cyberwar which could draw in countries from throughout the … Continue reading Take the Iranian Cyber Threat Seriously

The F.B.I. Will Help Companies Identify Malicious Insiders

There are insider threats, and there are insider threats. One type of insider threat can be classified as naïve. This refers to those employees who expose the company to cyber attacks through their irresponsible behavior. For example, an employee may have been told that public WIFI services are unsafe, but they log into their company … Continue reading The F.B.I. Will Help Companies Identify Malicious Insiders

Malware that Manipulates Safe Mode to Take Over Corporate Networks

There are times when you may be instructed to reboot in safe mode to remove malware from your computer. The reason for this is that safe mode only boots in drivers that will allow Windows or other operating systems to run at a minimal level. It will not boot in the drivers for third party … Continue reading Malware that Manipulates Safe Mode to Take Over Corporate Networks