Analysis of VPNFilter botnet

EL5 As we move forward in our technological advancements, there will be a concurring rise in damage that results from technological attacks. The more interconnected we become, the more vulnerable we are when a new form of threat arises. VPNFilter demonstrates how cybercriminals advance with the new technology and integrate degrees of portability by building

Read More »
EU General Data Protection Regulation

GDPR Rolls Out

GDPR Is Active The 25th has arrived in the EU and that means that the GDPR is released and active, as well as already drawing up some paper work for lawsuits against companies that are not readily complying with the new regulations. The GDPR is all about “privacy by default” meaning that a product or

Read More »

The Cost Of GDPR

March 25th halting the march of some companies As the GDPR marches forward there has been alot of talk about it’s affects on the smaller companies that don’t have the capabilities to rework their entire infrastructure of their products and systems. Europe’s new data protection law has seen many companies decide to call it quits

Read More »
EU General Data Protection Regulation

GDPR Inbound

What is the GDPR and who does it affect? As of late there has been quit alot of mention about the “GDPR” across business, technology and government articles, mentioning how the GDPR will turn the tech world and all things consumer information on it’s head. But what does that actually mean? It’s important to know

Read More »

Hackers and Emails

Emails in 2018, still vulnerable Emails have always had a fickle feeling security. Often we see and hear news about peoples emails getting hacked and losing vital personal information or important business information. Even in our government we have seen multiple occasions when high ranking officials have lost access to their email or had it

Read More »

Android hacked and crypto mined

Android Defenses Breached On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero. The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked

Read More »

Tech Goliaths taking a lashing

We have all become painfully aware of the involvement of technology to our daily lives and how it has been keeping keep eyes on us for more information about our lives. This has been particularly noticeable with Facebook, the social media giant through the use of Ads. If you decide one day your interested in

Read More »