Human Traffickers Use Social Media to Lure Victims

Human traffickers worldwide are increasingly using social media to contact vulnerable victims. Human traffickers know how to search out a needy child or teenagers who may be insecure and wanting attention. The trafficker may appear to take a special interest in the child and tell them what they want to hear…this is called grooming. Once […]

Equifax Data Breach Exposes 145.5 Million Records

What is Equifax? It’s a consumer credit reporting agency. Recently, on September 18, 2017, Equifax noticed it was a victim to what turned out to be one of the largest security breaches in history, and in early March it had begun “notifying a small number of outsiders and banking customers” about this attack. Equifax was warned months before the breach […]

Briggs Stratton Healthcare Information Breach 2017

Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen. NATURE OF THE BREACH Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information […]

How Much Do You Trust Your Antivirus Company?

Do you know which data your antivirus collects during scans? Antivirus has kernel level access to the operating, meaning there isn’t a file on your computer hard drive that it can’t touch. Antivirus scans data that is being read from and written to the hard drive, and depending on which antivirus company you choose, data […]