IT

Innovation isn’t confined to the world of legitimate commerce and business.  Criminals innovate too.  That’s become all too apparent in the last month with the advent of new kinds of so-called “ransomware” attacks around the world. The idea of ransomware has been around for a decade or more.  Yet...

Spring is traditionally the time when we de-clutter.  Purging all of the stuff we just don’t need is spiritually satisfying, and it also serves as a reminder of what’s truly important to us. The healthy feeling you get from spring cleaning can extend to the technology side...

As long as there has been an internet, there have been internet scams and cybersecurity incidents.  As long as there has been a tax system, there has been tax fraud of one sort or another.  In a way, it’s surprising that it took so long for these...

It’s well known that prevention is the most effective and least costly form of cybersecurity.  Once a breach happens, it can be very difficult to get back to “normal”, if such a thing even exists anymore.  Better to augment that “normal” state with the most robust defense...

When hackers strike, it’s never pretty.  Businesses are disrupted, customers lose faith, the brand suffers.  And when it happens more than once, I.T. departments (and their superiors) start to ask more pointed questions.  The issue shifts from “why did this happen?” to “what can we do to stop...

On March 1, a group of researchers working in academia and the tech sector released news that over a third of the servers on the internet are susceptible to having their secure traffic decrypted were it to be intercepted.  Welcome to CVE-2016-0800, the DROWN attack. Anyone who’s been...