Phishing Attack Targeting Turkish Companies

This image is about a phishing attack targeting Turkish companies.

Blog Phishing mail targeting Turkish companies has been detected.  Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and […]

Cyber Security Transformation Steps For Success

This image is about cybersecurity transformation steps for success.

Blog Cloud computing has garnered the attention of the Department of Defense as data and computer processing needs grow and budgets shrink. Programs are interested in the potential of cloud computing to control growing data management costs, but reliable literature on the costs of cloud computing in the government is still limited. Researchers found that […]

The Internet of Bodies Will Change Everything, for Better or Worse

This image is about the Internet of Bodies and its impact.

Blog Internet-connected devices like smart thermostats, voice-activated assistants, and web-enabled refrigerators have become ubiquitous in American homes. These technologies are part of the Internet of Things (IoT), which has flourished in recent years as consumers and businesses flock to smart devices for convenience, efficiency, and, in many cases, fun. Internet of Bodies technologies fall under […]