The Internet of Things (IoT) is something we have previously discussed in terms of computer forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of…

Read More

  Sometimes when people think of computer threats, they think of viruses. However, that term only covers one type of security threat that can be captured under the umbrella term, “Malware.” Malware is the word that describes all types of software whose purpose is to infiltrate and infect a host computer or network. There are…

Read More

  Whether you’re adding a new computer or even something as small as a tablet, you’re going to need to make sure that your new device is properly integrated into your network. Without proper integration, you run the risk of unnecessary complexity, which could lead to an insecure environment. Today we’re going to talk about…

Read More

Recent findings in the mobile phone industry have left many Android users wondering, how secure is my data? Qualcomm microprocessor chips, the most popular chip manufacturer for Android devices, have been found to contain four major security flaws that have left upwards of 900 million users at risk of being maliciously attacked. These vulnerabilities, if…

Read More

  Mobile security is a very important aspect of your company’s overall security plan. All of your employees have cellphones and some may even have company phones. Ensuring that the data is protected on these devices is nothing to be taken lightly. Today we’re going to be talking about how you can protect mobile devices.…

Read More