Workplace Shortages Can a company remain operational if all its employees can’t come into work? The question might seem ridiculous from the outset. But in 1914, when the powers of Europe clashed in what would become known as the Great War, business owners throughout the continent were faced with this very issue. All young men […]

Read more

  Last year, thousands, possibly millions of people received rather disturbing emails. The emails took various forms, but all followed the same, basic structure. For example: If you had been more careful while caressing yourself, I wouldn’t worry you. I don’t think that playing with yourself is very bad, but when all your colleagues, relatives […]

Read more

  Do You Know Where Your Face Is? Pictures of you exist, right now, in all kinds of places. When you obtain a driver’s license, your mug is entered into a government database. Same goes for some gym memberships, or the ID card you use to enter your midtown office building. Most of all, though, […]

Read more

NEWARK, CA, January 22, 2020 “After many months of hard work and dedication, we are proud to launch our new product: fudocloud.com. It brings privileged access management benefits to small and medium-sized companies, without the need of installing any hardware. From now on they don’t have to always trust, but can also verify what is […]

Read more

What would you do if you woke up one morning, got out of bed, showered, made breakfast and, while you were eating your Wheaties, checked your bank account to find a couple hundred thousand dollars missing? What would appear to be a comically exaggerated scenario was, in fact, a reality for one New York resident […]

Read more

On March 22nd of this past year, a lone hacker broke through a misconfigured web application firewall to access personal data on over 100 million Capital One Bank customers. Then in September, another lone hacker breached the internal databases at Zynga–one of the world’s biggest mobile game developers–eventually leaking account data on over 170 million […]

Read more

You’ve been driving all day and could use a meal. You exit the highway and end up in a small town with just one main road. Along the road there’s a Wendy’s, and what appears to be a small restaurant. These seem to be your only two options. Which will you choose? On one hand, […]

Read more

It was inevitable that artificial intelligence technology would eventually be implemented into cyber defense (and hacking, for that matter). What was less obvious was how exactly that implementation would occur. Now that the shift has begun, we’re developing a greater understanding. AI is particularly adept at handling the large volumes of data that flow through […]

Read more

The top 13 terms that you need to know to be cyber safe: BEC scam Brute-force attack Credential stuffing Dictionary attack Email spoofing Island hopping Malware Phishing Ransomware Rootkit Spyware Scareware Zero-day 1. BEC scam BEC stands for Business Email Compromise and it’s also known as ‘CEO Fraud’ or whaling. BEC is a more sophisticated […]

Read more

Have you ever spoken with a friend about buying shoes, then had an advertisement for shoes show up in your YouTube feed? Or perhaps there’s construction outside your house, and Facebook delivered you an ad for earplugs. Everybody has their own story like this. Major content platforms are capable of delivering suspiciously timely, on-the-nose ads, […]

Read more