Houston Private Investigator Investigative Hiring Advice

This Houston private investigator says that one thing can be said about most professions: There are ethical professionals and there are bad apples who reflect poorly on everyone. The PI business is particularly attractive to some people who see it as glamorous and with low barriers to entry. I personally believe that blatant liars and […]

The risk that “no risk” offers pose to your business

By:  Lesley Fair Small businesses and nonprofits should never be on the receiving end of another company’s deceptive practices. An FTC action challenges the methods of companies that allegedly pitch offers for “no risk” business publications and then follow up with hefty bills for unauthorized orders. But it doesn’t stop there. The FTC says if […]

Digital Fraudsters Use COVID-19 Scams to Target Younger Generations

TransUnion released its quarterly analysis of global online fraud trends, which found that the telecommunications, e-commerce and financial services industries have been increasingly impacted.   “Our data showed the opposite with younger generations, Millennials and Gen Z (those born in or after 1995), being the most targeted. Adding insult to injury, our survey found Millennials […]

How to Defend Against Digital Surveillance when Teleworking

As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home. […]

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he’s calling Thunderspy – which targets devices with a Thunderbolt port.   Any time someone requests physical access to your device, whether a laptop, phone, or tablet, there is cause for concern, he says. “Being able to load a malicious payload directly to […]

Houston Texas Private Investigator Sees Business Back Close to Normal

The COVID-19 pandemic and the resulting restrictions on all types of business is diminishing in severity. Texas businesses are opening again with some distancing and other restrictions in place. Houston Texas private investigator Rob Kimmons at Kimmons Investigations is seeing business almost back to a more normal level. Houston Private Investigator Corporate Investigative Services Based […]

Panda Security Report: Ransomware & Fileless Attacks are a Growing Concern

The new Panda Security Threat Insights Report 2020 compiled by PandaLabs – anti-malware laboratory and security operations center (SOC)  –illuminates several emerging trends in the cybersecurity space. The Panda Security Threat Insights Report 2020 highlights data compiled by PandaLabs – the anti-malware laboratory and security operations center (SOC) of Panda Security, which has illuminated several emerging trends […]

Are you Ready for These 26 Different Types of DDoS Attacks?

Although distributed denial-of-service (DDoS) is an old school attack vector, it continues to be a serious threat to organizations. Not only is DDoS a way for hacktivists to manifest protest against Internet censorship and controversial political initiatives, but it’s also a goldmine of opportunities for achieving strictly nefarious goals. For instance, the latest tweak in […]

Toll Group Suffers Ransomware Attack Again

Toll Group suffers a ransomware attack for the second time in four months. Toll Group took the precautionary step of shutting down certain IT systems after unusual activity on some of servers was detected. Later, Toll Group confirmed the attack was a new form of ransomware known as Nefilim. Charles Ragland, security engineer at Digital Shadows, explains that “Nefilim is a […]

Biometric Data: Increased Security and Risks

Biometrics has the potential to make authentication faster, easier and more secure, as long as it is handled with due care. Based on this, what can companies and governments do to offer a safer digital environment for consumers? Biometric authentication uses human physical or behavioral characteristics to digitally identify a person to grant access to […]