1FA, 2FA, 3FA, 4: A Primer on Multi-Factor Authentication

Our information is important to us. Doesn’t matter if it’s our emails, bank information, social media credentials, or our phone passwords. It all matters. So how can we protect our information even when it seems hackers hold the winning cards? Authentication processes can vary from program to program, and almost all of them try to […]

Up in the Clouds: Benefits and Risks of Cloud Computing

So much of what we do today is on the cloud, but do you actually understand the basic benefits and risks of using cloud services? Thanks to the now-ubiquitous usage of cloud computing, many people have derived a general idea of what the cloud is: a means of storing and accessing data online. Many Apple […]

Stuck in the Middle(ware)

You may have never heard of it, but it’s been on your computer the whole time. It’s called middleware, and it deserves a little more spotlight than it gets. What is Middleware? Middleware is any software that connects the operating system and kernel to the other applications on the device, and it is often described […]

Some R.U.F.F. Young Men

When I was growing up, life was pretty different than it is now. It was the cusp of the technology age and the sound of dial-up filled our homes. Modern times have brought us phones that double as computers and, with that, children who have never known a life without advanced technology. Many of these […]

Tombstones and Twitter Feeds: Social Media After You Die

For centuries, man has pondered what comes after death. many answers have arisen, but there’s still one question that might not have crossed your mind. What happens to my profile after I die? We spend hours on crafting our social media profiles to put them on display for our friends, family, and coworkers. We put […]

Your Online Presence: A Hacker’s Perspective

We’ve all been told by our parents, “Don’t talk to strangers!” But did they ever tell you that you might be telling your friends… too much? For most of us in the digital age, a typical day isn’t complete without logging into social media. And sometimes we get a little too invested in what we […]

A Planet of Power in One Little Box

Continuous monitoring and ongoing vulnerability scanning are both fundamental components of cybersecurity and should be top priority items for any organization. Then again, the term “cybersecurity” makes many executives feel a bit uneasy. What ends up daunting these executives is how expensive it is to have top-of-the-line security. Quality products and services are not in […]

Why You Should Want to Get Hacked

Would you like to be hacked? No, of course not! Well, what if I told you that there is a way to be hacked that can actually benefit your overall network security? When put like that, it doesn’t sound so bad! And that is what Penetration Testing (i.e. Pen Testing) is all about. In simple […]

Malware 101: Criminal Strategies, Pt. 2

In our previous article, Malware 101: Criminal Strategies, Pt. 1, we explained how cybercriminals dupe their targets into downloading malicious software, potentially causing severe damage to the user’s computer. For this article, we will focus on how malware can spread unhindered through a network, without any need for authentication from users. The primary difference between […]

Malware 101: Criminal Strategies, Pt. 1

It’s easy to think, “I won’t be a victim of a cyberattack.” But the truth is that millions and millions of people in the United States alone are victims of cybercrime, and malicious emails are becoming more prominent in this cyber-dependent world. To put that into perspective, in 2017, over 20 million people were victims […]