Jan 29, 2024 | Newsletters
What does privacy mean to you? International privacy laws like the General Data Protection Regulation in the European Union, national laws such as the Personal Information Protection Law in China, or state laws like the Delaware Personal Data Privacy Act create...
Aug 8, 2023 | Newsletters
Regardless of an organization’s size, everyone is vulnerable to cyber attacks and data breaches. Every day cybercriminals come up with new and creative ways to steal private or sensitive information that they can then leverage for money. The following table...
Nov 25, 2019 | Newsletters
As the holiday season arrives, online shopping is crucial in getting just the right gift for friends and family. Customer reviews can make or break a product and knowing what products are worth your while can lead to a more successful shopping experience. The typical...
Nov 25, 2019 | Newsletters
Alexa and Siri allow millions of users to turn off the lights, play their favorite songs, and even place Amazon orders just by using voice commands. These devices listen for activator words and the instructions that follow to turn spoken commands into computer...
May 18, 2015 | Newsletters
There are many variants of malware, each with a different attack pattern. Three of the most common kinds of malware are described below. Viruses Computer viruses are one of the most well-known forms of malware, and they derive their name from their similarities to...
May 18, 2015 | Newsletters
Most malware requires user action–or a negligent user’s inaction–to make it onto a host system. Usually, scammers use a variety of tricks to get victims to download, install, and run malware on their computers or devices. Malware distribution is largely...