+1.813.321.0987
Infosec Articles (2/29/19 – 3/14/19)

Infosec Articles (2/29/19 – 3/14/19)

Over the last couple of weeks we’ve seen point-of-sale malware making its way to the top of the threats list, at least in terms of headlines and focus. A rather shocking discovery was a PDF flaw that dates back 20 years and allows these legally binding documents...
Infosec Articles (2/14/19 – 2/28/19)

Infosec Articles (2/14/19 – 2/28/19)

The second half of February 2019 continued to highlight server vulnerabilities with a Linux ransomware named B0r0nt0K making headlines. There’s a useful privacy resource about the pros and cons – along with how-tos – for deleting oneself from social...
Is Online Privacy the Next Phase of Globalization

Is Online Privacy the Next Phase of Globalization

Google’s first privacy fine post-GDPR sounds substantial. $57 million could certainly buy a first-class infosec infrastructure for a medium-sized company and keep many payrolls rolling out for years to come. But bear in mind that relative to Google’s earnings it...
Infosec Articles (1/30/19 – 2/13/19)

Infosec Articles (1/30/19 – 2/13/19)

Our top picks for industry articles include a detailed explanation of fileless malware by the folks at Trend Micro. A great reference for those collecting threat data is the piece on Windows file types used by malware. And just in case you missed it, one source gives...
Infosec Articles (1/15/19 – 1/29/19)

Infosec Articles (1/15/19 – 1/29/19)

Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and Office documents continue to be infection vectors. For more articles, check out our #onpatrol4malware blog. Tweet New...
Infosec Articles (1/1/19 – 1/14/19)

Infosec Articles (1/1/19 – 1/14/19)

Off to an active start in 2019, cryptocurrency mining malware is topping lists once again. Read articles about this nuisance and several others in our industry article picks for the first of the year. For more articles, check out our #onpatrol4malware blog. Tweet NSA...