PhishingAttack

Beware: MouseOver Cyber Mine Field!

It really is a minefield out there!  A cyber minefield, but a minefield nonetheless. Cyber Threat Analyst have discovered a new malware delivery method that uses a PowerPoint file embedded in an email as its vector. The email body directs the reader to “see attached” item. The email message attempts to entice the reader by…

AnalyticImages

Analytical Tools, Your Best Ally to Propel Your Organization to the Next Level of Success!

In today´s digitized world we are dealing with data volumes that are measured in yottabytes (1,000,000,000,000,000,000,000,000 bytes).  Just one minute of Internet data flow accounts for 640 terabytes on any given moment.   This makes an incredibly large amount of information available to connected users.  While it is a great thing, it also poses a large-scale problem…

UAV_BorderSurveillance

The Eye in the Sky

Drones are no longer a thing of Sci-Fi movies. They are becoming part of our skylines, and they are here to stay.  From military operations, first responder support, agricultural applications, filmmaking, to border security we are seeing these unmanned vehicles taking center stage.  Manufacturers are making these tools, once limited to military applications, more accessible…