Security Risks with Contact Tracing App for COVID-19

Laura BednarCybersecurity and VulnerabilitiesLeave a Comment

Contact Tracing App Google Apple

Tech giants Apple and Google have decided to work together in an effort to create a system that uses Bluetooth on our mobile phones to detect when you have come into contact with someone who may be positive for Coronavirus. This system is called “contact tracing” and by using mobile phones and their connectivity, public health organizations can see who … Read More

Virtual Meeting Platform, Zoom, Has Security Flaws During Increased Use

Laura BednarCybersecurity and VulnerabilitiesLeave a Comment

Zoom Video Conference Calls

Schools, companies, and even family members have turned to the virtual meeting platform, Zoom, to stay connected and attempt to keep things “business as usual” in this new normal we find ourselves in. However, since the surge of users over the last month, the platform has had incidents of hackers joining meetings and users having their privacy invaded by the … Read More

Cybersecurity Lawyer Identifies First Attack on WHO Website

Laura BednarCybersecurity and VulnerabilitiesLeave a Comment

World Health Organization Cyberattack

With an increase in remote workers during the COVID-19 pandemic, there is also a greater chance for hackers to create new ways to access sensitive information on personal devices. The Federal Bureau of Investigation has even noted that there has been an increase in fraudulent crimes since the surge in remote work. While the targets may have been corporate level … Read More

How to Stay Safe While Online Shopping During the Pandemic

Laura BednarBest Practices, Cybersecurity and Vulnerabilities, In The NewsLeave a Comment

Safe While Online Shopping

In response to the Coronavirus pandemic and “shelter-in-place” orders, online retail traffic is up 28%, a surge only seen during Black Friday and Cyber Monday. This surge in online activity affects the amount of bandwidth available for internet users everywhere. But more importantly, this increased traffic results in a higher risk for cyberattacks. In this post, we will explore the … Read More