Protecting Against Data Destruction Attacks

Olympic Destroyer Recently, a string of cyber attacks disrupted services and caused a multitude of IT-related issues at the Winter Olympics in PyeongChang.  While who is behind the attacks and the method of compromise are currently unknown the intention of the malware, known as ‘Olympic Continue Reading

Spectre and Meltdown: What You Need to Know and How to Protect Yourself

What are Spectre and Meltdown? Earlier this year security researchers made public the discovery of several vulnerabilities affecting nearly every computer, laptop, and smartphone on the market.  Known as Spectre and Meltdown, the vulnerabilities exist in the design of modern processors and allow for sensitive Continue Reading

Trouble in Paradise: Hawaii Emergency Mismanagement

On Saturday January 13, 2018, people in the Hawaiian islands found themselves in the midst of a large-scale panic when an emergency alert for a ballistic missile attack was broadcasted statewide.  An official all clear message was issued 38 minutes later to both residents and Continue Reading

Defense Strategy for BYOD Networks

    Bring your own device (BYOD) is a trend that has grown increasingly common over the past several years among companies both big and small.   It allows employees to utilize their personal devices in the workplace by connecting them to the internal network, access Continue Reading

Huge Flaw Discovered in Microsoft Office

In this month’s Patch Tuesday, Microsoft patched a massive vulnerability affecting all Microsoft Office versions released in the past 17 years that allows for malicious code execution. The vulnerability (CVE-2017-11882) affects the Microsoft Equation Editor (EQNEDT32.exe) and was discovered by the Embedi research team. The Continue Reading