}
What to know about security vulnerabilities Meltdown and Spectre

What to know about security vulnerabilities Meltdown and Spectre

In early January, it was revealed that nearly every computer chip made in the past 20 years contains fundamental security flaws called Spectre and Meltdown. Both bugs use a side-channel analysis attack, where malicious code can let attackers see information stored in...
Security vulnerabilities discovered in security cameras, routers

Security vulnerabilities discovered in security cameras, routers

Some Internet-connected surveillance cameras could be doing more harm than good. Researchers from ReFirm Labs, a Maryland cybersecurity startup founded by former National Security Agency employees, recently discovered vulnerabilities in TRENDnet, Belkin, and Dahua...
Copy Machine Poses Cyber Risk

Copy Machine Poses Cyber Risk

One of the constants in business offices decade after decade is the copying machine, and copiers today are far more advanced than in earlier years. But new technology sometimes brings new problems. Modern copiers have hard drives that allow the convenience of digital...
Cyber Extortion is Real and Can Be Catastrophic

Cyber Extortion is Real and Can Be Catastrophic

Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing.  At risk in a digital extortion attack is not only a company’s reputation and data, but also its ability to function and even its very...
Employee mistakes a big source of data breaches

Employee mistakes a big source of data breaches

When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by CompTIA it isn’t an unknown hacker that’s most likely to directly...