It’s the nightmare scenario for most cybersecurity analysts, and one that they’ve increasingly warned about in recent years. A hacker decides to target a critical piece of infrastructure, like a power plant or any of the 55 National Critical Functions … Continue Reading

Protect Your Crypto Keys, Protect Your Data
Encryption has become a hot topic not only in the tech world but in the world of government as well. Adding backdoors to encrypted products is a movement of which many leaders are in favor. People are searching for more … Continue Reading

Flaw with Thunderbolt Technology Puts User Security at Risk
What was designed to be a tool for transferring data at faster speeds is now found to be anything but a convenient advancement. The Thunderbolt cable by Apple allows one computer system to connect to another for system migration or … Continue Reading

Why Healthcare Data Is Valuable to Hackers
If a cybercriminal gains access to your entire health record, that information becomes the target of every conceivable variation of a cyberattack. A health record contains some of the most sensitive personally identifiable information (PII) about a person. But perhaps … Continue Reading