Spoofing Fully Qualified Domain Names
Spoofing Fully Qualified Domain Names How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a...
Bad Rabbit Ransomeware: Get Your Holy Hand Grenade!
On October 24th, ransomware known as Bad Rabbit infected devices primarily in Russia and Ukraine. According to Kaspersky Lab, almost 200...
Implementation Flaws
Often we find flaws in the implementation of technologies. Once the flaws are found we think companies will work to correct those flaws. ...
What if you Reply to SPAM
This is what happens when you reply to spam email | James Veitch YouTube "Suspicious emails: unclaimed insurance bonds, diamond-encrusted...
Patching People, the Weakest Link
"A recent Bitglass report identified phishing as the best method for data exfiltration, and also identified some of the biggest...
Equifax Data Breach News
The Equifax data breach will become a watershed moment in the history of cybersecurity. Not because of the number of records released,...
What should you do about the Equifax data breach?
It is still early in the investigation and new information continues to come to light, but it is clear that almost half of all Americans...
Cybersecurity Takes Teamwork
To defeat a strong enemy: Deploy forces to defend the strategic points; exercise vigilance in preparation, do not be indolent. Deeply...
What to do during an Active Threat
Here is a public service announcement on what to do if there is an active shooter or active threat on campus or any other public location....
What you need to know about ransomware
Ransomware is a threat that is growing exponentially is your organization ready? Learn what we know about the perpetrators, what they...