A Distributed Denial of Service (DDoS) Attack Hit Hard on 10/21

  On October 21st, a major server-providing company was attacked with a widespread DDoS attack. Dyn, the company in question, provides servers for major companies like Twitter, Netflix, and LinkedIn. The attack brought down these sites and many more for end users on the east coast. The spokesperson for Dyn insists that they never experienced…

Read More

Understand the New World of Cybersecurity

  The internet has come a very long way in a handful of years. What was once something people “fooled around with” in their off-time has become an essential tool for business, networking, and daily life. The problem with many end users, be they companies or civilians, is that they are not adapting with the…

Read More

Does Your Company Need Penetration Testing?

  The short answer to this question is: Yes, most likely. All company networks at all levels could benefit from the value of penetration testing. However, you might be wondering what exactly penetration testing is and why it matters. Today we’ll be going over exactly that.

Read More

Hospitals and Medical Devices Need Cybersecurity Measures

  The information age has brought with it many wonderful advances in medical research and devices, but sometimes the systems of defense just can’t keep up. Things as essential as pacemakers and insulin pumps are operating off of networks, just like a set of speakers. Though this allows for a greater range of use for…

Read More

Famous Malware Throughout History

  Sometimes particularly vicious instances of malware are remembered and named. These infectious programs have wreaked serious havoc throughout the internet, costing billions of dollars in damages and lost revenue. Today we’re going to be going over some of the most famous malicious programs to ever come across the internet and what we can learn…

Read More

Phishing Attacks Are Insidious

  Sometimes the easiest way to get into your machine is to just ask. Phishing attacks utilize the power of social engineering to manipulate you into allowing cyber criminals to infect or infiltrate your network. These tactics are quite clever, and to combat them you need to be even more clever. Today we’re going to…

Read More

Why Would a Hacker Want Your Email Address?

  You already know that you need to keep your email accounts safe from infiltration, but do you know why that is? Hackers can access a wide variety of information about you and your business just by getting the credentials to your email account. Today we’re going to be going over some of the things…

Read More

Addressing the Vulnerability of the Internet of Things

  The Internet of Things (IoT) is something we have previously discussed in terms of digital forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of…

Read More

A Basic Guide to Malware

  Sometimes when people think of computer threats, they think of viruses. However, that term only covers one type of security threat that can be captured under the umbrella term, “Malware.” Malware is the word that describes all types of software whose purpose is to infiltrate and infect a host computer or network. There are…

Read More

Integrating New Technology into Your Network

  Whether you’re adding a new computer or even something as small as a tablet, you’re going to need to make sure that your new device is properly integrated into your network. Without proper integration, you run the risk of unnecessary complexity, which could lead to an insecure environment. Today we’re going to talk about…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075


8996 Parent ST
Livonia, MI 48150

888 Emerald Drive
Windsor, CO 80550



- 128 days ago

Atlantic Data Forensics Testifies with Millions at Stake; Client Awarded ALL Assets AND 100% of Atlantic’s Fees https://t.co/aW7SHraMwP
h J R