Generative AI and Privacy

What does privacy mean to you?  International privacy laws like the General Data Protection Regulation in the European Union, national laws such as the Personal Information Protection Law in China, or state laws like the Delaware Personal Data Privacy Act create...

Major Security Breaches in 2023

Regardless of an organization’s size, everyone is vulnerable to cyber attacks and data breaches. Every day cybercriminals come up with new and creative ways to steal private or sensitive information that they can then leverage for money. The following table...

Faking online ratings

As the holiday season arrives, online shopping is crucial in getting just the right gift for friends and family. Customer reviews can make or break a product and knowing what products are worth your while can lead to a more successful shopping experience. The typical...

Are your devices listening to you?

Alexa and Siri allow millions of users to turn off the lights, play their favorite songs, and even place Amazon orders just by using voice commands. These devices listen for activator words and the instructions that follow to turn spoken commands into computer...

What are the kinds of malware?

There are many variants of malware, each with a different attack pattern. Three of the most common kinds of malware are described below. Viruses Computer viruses are one of the most well-known forms of malware, and they derive their name from their similarities to...

How is malware distributed?

Most malware requires user action–or a negligent user’s inaction–to make it onto a host system. Usually, scammers use a variety of tricks to get victims to download, install, and run malware on their computers or devices. Malware distribution is largely...