MongoDB Hacks Lead to Many Data Breaches
Superior Solutions Inc
by admin
1y ago
Many data breaches are the result of the failure to take even the most basic precautions. Here are several that have been reported in the past:  Garage sale bargains: One garage sale customer purchased a filing cabinet packed with personal data including Social Security numbers and home addresses.  Sensitive data transported in an employee’s car: An organization held its annual drill to assess its data breach preparedness. Yet instead of using test data, the actual data was left in an employee’s car overnight and stolen most likely along with the owner’s favorite Rick Ashley CD. &n ..read more
Visit website
Ethical Hacking Reveals Holes In Cloud Security
Superior Solutions Inc
by admin
1y ago
When your virtual or cloud based network has security holes in it, if somebody doesn’t already know about it, it won’t belong before somebody does. Cloud based services are becoming a big target for cyber criminals. These criminals have the time and ability to scan large portions of the Internet simply looking for vulnerabilities in random company networks. Sometimes these exposures can be from the provider itself.  An example of this can be seen with Cloudflare, which exposed user data from 3,400 websites in February of this year due to the way Cloudflare parsed HTML. Sadly, it ..read more
Visit website
IRS Tax Scams to Watch Out For in 2017
Superior Solutions Inc
by admin
1y ago
Michael Gregg Cyber Security Interview Tax Season is here and that means it’s time to watch out for hackers, scammers, and criminals. Criminals will be targeting your tax return. Michael Gregg was interviewed by Fox News on the tax scams of 2017. Mr. Gregg warned viewers to watch out for the these three types of IRS tax scams in 2017: Tax refund fraud: Criminals will steal your personal data in order to file fake tax returns on your behalf, thereby stealing your refund. Identity theft: Criminals will impersonate the IRS, threaten taxpayers with fines and penalties, in order to trick them i ..read more
Visit website
Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017
Superior Solutions Inc
by admin
1y ago
Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting victims include the following: Target the taxpayer – This is a most common method of attack. One technique is phishing emails that pretending to be from IRS and ask you for personal information or ask you to click on malicious links or open files that are infected. Trojans are another technique; this malware can be used to extract sensitive data ..read more
Visit website
Snowden Movie Brings Issue of Personal Privacy to the Forefront
Superior Solutions Inc
by admin
1y ago
Michael Gregg appeared Friday, September 16th on The Fox Morning Show in Houston to talk about the risks to personal privacy that are now occurring because of technology and how these threats will become more advanced and widespread for the foreseeable future. Michael Gregg has been asked to comment on several movies that deal with hacking such as “BlackHat” and the “Snowden” movie that has just been released. One of the issues that is highlighted in the Snowden movie is the ability to remotely access smart phones to spy on individuals. Is this real? Yes, it is! Michael Gregg Fox News St ..read more
Visit website
Ransomware / Data Sabotage – A Growing Threat
Superior Solutions Inc
by admin
1y ago
Michael Gregg has a new article out on Cyber-ransom that’s featured in the FBI’s Law Enforcement Bulletin. The article examines the growing risk of data sabotage. Ransomware is the perfect, digital weapon for a saboteur as it’s extremely destructive and difficult to remove. Cyber-ransom is basically a data sabotage threat that has spread quickly over the last several years. Ransomware is known by many names such as Reveton, CryptoLocker, and CryptoWall among others. Regardless the name, the objective is the same, payment!  Attackers instruct those infected to provide payment and only the ..read more
Visit website
How Data Brokers Threaten Your Privacy and Resell Your Information
Superior Solutions Inc
by admin
1y ago
Data brokers are buying, sharing and selling your information online.  While you have probably never heard of these companies…. they know all sorts of information about you and have most likely added you into a category such as: Financially Challenged, Democrat, Republican, Expectant Parent, or even Bible Lifestyle. That’s not all they know. Their database of information includes address, property ownership, income, criminal records, family members, and even hobbies. If you have searched for something on the Internet or make online purchases data brokers know it. From smart phone apps tha ..read more
Visit website
The US / Russian Simmering Cyberwar
Superior Solutions Inc
by admin
1y ago
Russia’s cyber assault on the US election is one of the most provocative acts we have seen against the US from a cyber prospective. It should be clear that cyberwar is an effective tool for Russia’s military and political goals. How should we respond… Read more of Michael’s new article on Huffington Post.   ..read more
Visit website
Is Windows 10 Spying On You or Simply Building a Better User Experience?
Superior Solutions Inc
by admin
1y ago
Microsoft has come under fire from privacy advocates because many end-users feel that Window 10 is way too intrusive.  While it is true that much of this data is used to enhance user experience, Microsoft’s lack of transparency isn’t doing much to dispel the notion that they are spying on end users, gathering much more personal information than needed, and making it way too difficult to opt out. If you’re wondering what kind of data Microsoft collects from Windows 10 users, it includes: Personal information about your browsing habits and what you’re doing on your computer It borrows band ..read more
Visit website
Why Ethical Hackers Are In Strong Demand
Superior Solutions Inc
by admin
1y ago
Ethical hackers are in strong demand because modern cyber attacks can be highly focused, targeting your online assets and intellectual property. Especially in this BYOD (bring your own device) era, security breaches must be avoided. It’s like a hole in the wall of your office or a hole in the fence at your property line. The malicious hacker get easy entry. If it is your proprietary data that they are helping themselves to, losses can mount quickly. Then, there are those Internet vandals too, known as hacktivist. Hackers doing critical damage just for the fun of it, hacktivist are despised in ..read more
Visit website

Follow Superior Solutions Inc on Feedspot

Continue with Google
OR