Attackers Inside the Walls: Detecting Malicious Activity
Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source software can fill this gap, but these free solutions may...
View ArticleSocial Media Safety
It has become near effortless to discover individuals or groups which one can connect with online that share a common characteristic. According to Merriam-Webster, a social network is defined as “a...
View ArticleAvoid Being a Victim of Charity Fraud
Giving monetary donations to a cause you deem worthy is an admirable action. According to National Philanthropic Trust, Americans gave $427.71 billion in 2018 to charities. Fraudsters know holidays are...
View ArticleShopping Tips for the Holiday Season
It’s that time of year again, holiday shopping has begun! Everyone is looking for those unique gifts, new video games, trendy toys, and latest electronics. Whether it is a hard-to-find toy for kids or...
View ArticleTips to Secure New Devices and Your Home Internet for the New Year
The holiday season is upon us, which means shopping for the latest gadget is in full swing. With the massive number of discounts that are available this year, it makes sense for you to buy that latest...
View ArticleSpotting Tax Scams to Avoid Being a Victim
Tax season is in full swing, which means criminals will go to great lengths to separate you from your money, your identity, or anything of value that is within their reach. They may offer seemingly...
View ArticleSecurity Primer – Ryuk
Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, with infections doubling from the second to the third quarter in...
View ArticleIntel Insights: How to Secure PowerShell
If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the environment. This may not always be possible since this is a legitimate...
View ArticleBlockchain Technology: Local Government Applications and Challenges
This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in U.S. local governments as well as in other levels of...
View ArticleFake Online Coronavirus Map Installing Malware on Computers
Cyber criminals are taking advantage of the Coronavirus COVID-19 to steal personal data. A malicious website pretending to be the live map for Coronavirus Global Cases by Johns Hopkins University is...
View Article