Atlanta, GA,USA
(678)-621-8487
info@schwifty.com

Blog

Identify. Protect. Detect. Free Consultation. 678.621.8487

Hacking Scenarios: How Hackers Choose Their Victims

Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. Source: Hacking Scenarios: How Hackers Choose Their Victims

Cybercrime Getting More Sophisticated: How to Protect Your Business? | Threatpost

Attackers continuously expanding their capabilities, while organizations’ cyber security measures haven’t quite kept pace. Source: Cybercrime Getting More Sophisticated: How to Protect Your Business? | Threatpost

New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars

A novel Bluetooth relay attack could allow attackers to remotely unlock and operate cars, open smart locks in residential buildings. Source: New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars

You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results – Krebs on Security

Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after… Source: You Can Now Ask Google to Remove Your Phone Number, Email or Address from…
Read more

Your Phone May Soon Replace Many of Your Passwords – Krebs on Security

Apple, Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. Experts say the changes… Source: Your Phone May Soon Replace Many of Your Passwords – Krebs on Security New…
Read more

How to Protect Your Data When Ransomware Strikes

Here is a high-level rundown of what happens when ransomware strikes and how you can protect your organization. Source: How to Protect Your Data When Ransomware Strikes

Mayo Clinic, Google eyeing ‘AI factory’ as collaboration moves forward – MedCity News

Source: Mayo Clinic, Google eyeing ‘AI factory’ as collaboration moves forward – MedCity News Roman P. Dean

Unlocking LUKS2 volumes with TPM2, FIDO2, PKCS#11 Security Hardware on systemd 248

Posts and writings by Lennart Poettering Source: Unlocking LUKS2 volumes with TPM2, FIDO2, PKCS#11 Security Hardware on systemd 248 Roman P. Dean

Update Regarding Data Security Incident Due to Unauthorized Access | CAPCOM

Capcom Co., Ltd. (Capcom) announced that it has been the victim of a customized ransomware attack following unauthorized access to its network and has verified that some personal information maintained by the Capcom Group has been compromised. Source: Update Regarding Data Security Incident Due to Unauthorized Access | CAPCOM Roman P. Dean

Cyberattacks targeting health care must stop – Microsoft on the Issues

Source: Cyberattacks targeting health care must stop – Microsoft on the Issues Roman P. Dean