These Aren’t The Droid (Apps) You’re Looking For
08//23
One security flaw that comes to mind on Android phones is the ability to download phony apps from the Play Store or other websites. Apps make our lives easier by saving time and making connectivity more convenient. Whether it be the cost of the device, features of a phone, or the Google system itself. 1/3 of the US population makes Android devices their primary operating system. With over 2.5 million apps available to download, no wonder it can be easy to download a harmful app accidentally. Dr.Web reported that in December of 2022, trojans and spyware had increased. Though Google has been doing a better job removing these bad apps, some may go under the radar. This post will help you determine how to find out if an Android app is harmful before downloading and the best approach to evaluate those apps. Read More…
Rising Epidemic: Elderly Fraud Soars in America, Targeting Vulnerable Seniors - Part 1
07//23
People should be wary of sweepstakes scams that require payments to be sent to another country, as 4,995 elderlies were recently defrauded of over $100 million. In this blog post I share one of these victims stories.
Read More…
Read More…
So, the finance department gets an email.
07//23
Phishing emails are a serious threat to individuals and businesses alike. These emails are designed to trick recipients into giving up sensitive information, such as passwords or financial data. To protect yourself from phishing attacks, it's important to be aware of the signs of a phishing email and to always verify the sender's identity before responding to any requests for information. Read More…
Uncovering the Dark Side of Technology and Its Role in Child Abuse
04//23
I am honored to be acquainted with the Predator of Predators, who has single-handedly assisted in bringing over 500 predators to justice since 2008.
In this post I share with you Dark Side of Technology and Its Role in Child Abuse. With the popularity of social media, online gaming, and streaming services, children are exposed to a wide range of potential risks and threats. Read More…
In this post I share with you Dark Side of Technology and Its Role in Child Abuse. With the popularity of social media, online gaming, and streaming services, children are exposed to a wide range of potential risks and threats. Read More…
How the Metaverse Continuum Can Help Upscale Soft Skills and Prevent Overcrowding at Events
04//23
This blog post discusses the development of the Metaverse Continuum, a virtual world where people can access and own a part of the information. It is connected to web3, and companies such as Facebook have rebranded to Meta in order to prepare for the future. The Metaverse Continuum can be used to upskill adults on soft skills, and it was demonstrated in 2020 when Travis Scott performed a virtual concert on Fortnite, which was a huge success. In 2021, the same artist performed in Houston Texas and, unfortunately, 8 people died due to overcrowding. The Metaverse Continuum can be used to prevent this kind of tragedy by upskilling people on soft skills such as communication, problem solving and creativity. Read More…
How to Write Security Policies: A Guide Based on My Experience and SANS Templates
02//23
This blog post outlines the process of writing and implementing security policies. It explains why it is important to consider external and internal threats, how to keep the policy up to date with the changing technology landscape, and the importance of ensuring that all stakeholders understand and are held accountable for the policy. It also gives credit to SANS security policy templates, which provide comprehensive lists of topics and considerations to think about when creating a policy and provide examples to help better understand the process. Read More…
Test Your Ransomware Detection System with a Powerful PowerShell Script
02//23
This post introduces a powerful script written in PowerShell that allows users to test their Antivirus and Ransomware detection software. The script allows for easy editing, opening, and closing of various files, and creates a temporary directory and working folder for the generated files. It can open and close both .bat and .ps1 files, and utilizes the Windows Shell object to perform mouse movements, simulating user interaction. It is a great tool for automating security tasks and improving cybersecurity productivity. Read More…
How Cloud Can Be Used to Facilitate Data Management in Organizations
01//23
This blog post examines how the cloud can benefit an organization's data and knowledge management. Technology offers many tools to help organizations build and maintain these systems, but we focus on the cloud. Services like Amazon Web Services provide numerous solutions that help with data and knowledge management. The endless amount of data and information that organizations like police departments gather requires computing solutions to enable usability and accessibility. Read More…
Uncovering the Complexities of Crime Measurement: Examining the Uniform Crime Reporting System and National Incident-Based Reporting System
09//22
This article discusses the two current crime measuring tools used in the United States - Uniform Crime Reporting (UCR) and National Incident-Based Reporting System (NIBRS). Read More…
Overcoming the Challenges of Government Cybersecurity: An Analysis of Resources, Training and Technology
12//21
This article discusses the issue of government agencies not keeping up with technology and the lack of funds to do so. It also discusses the difficulty of training personnel for the roles of computer crime task forces and the need for agencies to share resources and information. I suggest three steps for solving these issues: separating the initial training of agents to include programming courses, agencies working better together, and distributing funds more effectively among agencies. Read More…