Category Archives: Law

Your Location has been Shared 5,398 Times in Last 14 Days

Your Location has been Shared 5,398 Times in Last 14 Days.

Posted in Apple, Business, Information Technology, internet security;, Law, Linux, Mac, Microsoft | Tagged | Leave a comment

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat   Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, Networking, Technology, Windows, Wireless | Tagged , , , , , , , , , | Leave a comment