}

Phone Applications With Potential To Hijack Planes

An IT consultant who is also a commercial pilot recently unveiled an app he developed for use with a smart phone that can hijack flight simulation software.  He argues this kind of app could be used to hijack a real plane.  The Federal Aviation Administration...

Insider threats pose cyber danger for small businesses

Small and medium-sized businesses (SMBs) typically perceive their cyber liability as less than that of huge publicly traded corporations.  After all, there is a continual stream of news accounts these days about hackers breaking into a big company’s network, stealing...

Is Your iPhone Charging Cord Infected?

Researchers at Georgia Tech recently discovered that malware can be introduced to iPhones through charging cords.  Yes, charging cords! Article Excerpt: Apple devices, from Macs to iPhones, have always been able to boast of advanced safety from viruses, spam and the...

Instagram Hit With Fruit Hack

Instagram has been hacked.  The culprits are hijacking accounts of affected users to send out images of fruit.  When another Instagram user clicks the image, they are redirected to a bogus web site advertising coffee. Article Excerpt: If you’re one of the 130 million...

Avoid the Seedy Side of the Internet

Avoiding the seedy side of the World Wide Web used to keep you relatively safe from viruses and malware.  Not anymore though.  Google recently released data showing that legitimate web sites, which have been hacked, are a growing danger and are infecting the users of...

Cloud-based social engineering attacks prey on unsuspecting employees

We’ve talked before about the dangers of phishing and spear phishing attacks.  These types of assaults seek to exploit what is typically the most vulnerable part of your digital security system – your employees.  If a hacker sees that a company’s network is relatively...