Privacy – Should Automakers Be Allowed to Read Your Texts?

A Federal Judge recently has ruled against individuals suing to keep automakers from reading users’ texts and call logs. https://therecord.media/class-action-lawsuit-cars-text-messages-privacy?fbclid=IwAR02MO4Q3bL59kNDSjTKhUPaQvZ9UNmMMv9CrKdNvzXu0Co0Q5DEz2bomSs

Imagine owning a USB Drive worth $235,000,000 and unable to access it

This article from Wired Magazine involves an old encrypted USB drive with a 7,000 bitcoins in a wallet that is locked because the owner lost the passkey. What would you…

Defending Against Voice Scammers

Social engineering is a numbers game, so the fewer scam calls, the fewer potential victims. However, with data breaches constantly occurring, your phone number may sooner or later get into…

Tips on Spoting A Credit Card Skimmer

Cyber Criminals are using more sophisticated and stealthy methods to steal your hard-earned money. It is important to keep up with current trends in skimming to protect yourselves from cyber…

Public Spaces are Prime Areas of Attack from Hackers

As more people are working remotely and embracing the digital nomad lifestyle and more concerts and sporting events are taking place this summer, some may not be taking precautions to protect their…

Healthcare Organizations in 5 States Hit by Cyber Attacks

A cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances to be diverted.

When organizations get scammed

This article contains a story of an organization that got scammed out of over $1,000,000. https://www.gzeromedia.com/global-stage/caught-in-the-digital-crosshairs/the-threat-of-ceo-fraud-and-one-ngos-resilient-response https://www.youtube.com/embed/2a_m3n9DiVg?si=3sIyc2NCpSylAdWp

10 Essential CyberSecurity Cheat Sheets

This article contains links to 10 CyberSecurity Cheat Sheets that will aid you in your CyberSecurity Career.

The FBI’s honeypot Pixel 4a gets detailed in new report – Ars Technica

https://arstechnica.com/gadgets/2021/07/how-the-fbi-weaponized-android-modding-with-anom-devices/

Ransomware Defense: Top 5 Things to Do Right Now | Threatpost

https://threatpost.com/ransomware-defense-top-5-tips/167536/