Worked in a variety of IT roles until cybersecurity captured her intrigue after resolving a multitude of different malware problems for clients. Concurrently with computer technology, she enjoys creative writing and even won a few writing contests as a child. Over the years, these interests have segued into a successful blogging career. She enjoys reading novels and biographies, console gaming, lurking in web forums, alternative fashion and listening to jazz, funk, and goth music.

You Need To Know Why Dharma Is Bad Karma For Your Computer

Dharma is a concept in eastern religions such as Buddhism, Hinduism, and Sikhism that has no direct English language translation. This Sanskrit word can be interpreted as the right way of living or the the path or righteousness and signifies that the universe is in accord with with “cosmic law and order.” But ironically enough,

[ Read More ]

Have You Been Fooled By An Insidious Text Message?

It’s completely understandable if checking your voicemail on your smartphone has become a dull chore. These days, people trying to reach you likely do so via email or text message. If you want to talk to someone using your actual voice, you may prefer using Skype or Google Hangouts or one of a plethora of

[ Read More ]

New Windows Defender Stops Viruses From Leaking Nasty Poison

Windows Defender has been around in some form or another since January 2005. In 2004, Microsoft bought GIANT AntiSpyware, an application which prevents spyware infections. Spyware is a type of malware which spies on you and allows cyber attackers to see what you’re doing on your computer and to view all the files on your

[ Read More ]

Is Your iPhone Making The Bad Guys Rich? You Better Know!

Apparently, some people think iPhones aren’t vulnerable to viruses and other types of malware. This simply isn’t true. Sure, iPhone’s operating system, iOS, has some real security advantages over Android, but that’s not where the story ends. iPhones need to be “jailbroken” if you want to install apps outside of the App Store, which means you

[ Read More ]

Introducing The Dangerous New Software That Will Ruin You

Heard of Azorult? Well, it’s a form of information-stealing malware with multiple features, including the ability to download even more malware from its command and control servers. Think of it like a Swiss Army Knife for cyber attackers—the little tool that does everything. Azorult was first spotted in early January 2018, although it may have

[ Read More ]

Here’s A Warning To The Police: Ransomware Is The New Criminal

In the past, information used by the police department to investigate crimes came in the form of paper documents, resting in physical file folders, housed in a series of file cabinets. These days, not a ton has really changed, as police departments still store data in this type of antiquated, old-fashioned way. But as fields

[ Read More ]

Strong New Malware Exploits Microsoft Word For Hidden Attack

One of the main goals of antivirus software is to prevent spyware infections, which cyber attackers can use to breach the confidentiality of your computer’s data. But in order for this malicious spyware to work, it must be able to evade detection by antivirus software. Security researchers have discovered a new cyber attack campaign that

[ Read More ]

What Happens When GPS Spoofing Takes Down A Power Grid?

When the layperson thinks about GPS, they typically visualize themselves conveniently driving with a nice, clear Google Map displayed on their smartphone to show them precisely where they are at all times. In fact, that’s how the vast majority of consumers directly interact with this type of technology—but like most digital things, there’s a bit more

[ Read More ]

Why Pentagon Weapons Are Frightfully Easy To Hack

It’s a fact—some industries are more digitally secure than others. Based on your own knowledge, which ones do you think have the best cybersecurity? The American military and the Pentagon ought to be near the top of the list, right? They have weapons, equipment, infrastructure, and oodles of resources, all of which can can protect

[ Read More ]