by Jacob Parker-Bowles | Feb 10, 2020 | Uncategorized
The year 2020 gleams with the prospect of technological changes that will continue to alter the enterprise of tech, along with the lives of those who live with it, in ways myriad and profound. That future requires a commitment to cybersecurity that extends into the...
by Jacob Parker-Bowles | Jan 7, 2020 | Uncategorized
5G technology offers a variety of benefits but also poses significant security concerns. One of the main security flaws is that a 5G network provides additional entry points for cyber attacks that can lead to data breaches and privacy concerns. Understanding the...
by Jacob Parker-Bowles | Nov 21, 2019 | Uncategorized
Security is essential to living comfortably. Even if the physical world seems safe, something could break through the door when everyone is out of the house. Luckily, security professionals from a leading internet security company have put together a list of their top...
by Jacob Parker-Bowles | Oct 26, 2017 | Cyber Security, Jacob Parker-Bowles, Uncategorized
Key Re-installation Attack is a security flaw in the Wi-Fi protected Access 2 (WPA2) protocol that gives an advantage to a hacker to break the encryption between router and a device. This mostly occurs during a four-way handshake process when users are trying to...
by Jacob Parker-Bowles | Oct 18, 2017 | Cyber Security, Jacob Parker-Bowles, Uncategorized
If you’re a US citizen, chances are you’ve heard the name Equifax in the news dozens of times over the past month or so. The company is responsible for possibly the most devastating hack of all time, resulting in millions of people’s personal information (including...
by Jacob Parker-Bowles | Aug 2, 2017 | Uncategorized
Wallets used to be primarily fashion objects- you’d choose it for its color, embellishment, or design. Maybe you’d go with a leather one over pleather because it would hold up better or you’d choose one with more pockets for storing all your cards and money, but...