Q-Day the Encryption Breaking Armagaddon

Posed a question to Grok about the Q-day timeline – and it came back with this: The question is designed for small business and using the DEFCON presentation mentioned below. Possible Quantum Day (Q-Day) Timelines “Quantum Day” or Q-Day refers to the point when quantum computers become capable of breaking widely used classical encryption algorithms … Read more

The Classic Question – How much to spend on Cybersecurity?

Let’s discuss this question (How much to spend?) on cybersecurity…   with a conversation of Jimmy and Jane  who are small business owners and have certain viewpoints:     Jimmy (Sales-Focused Owner): Hey Jane, I’ve been thinking about that cybersecurity gadget you mentioned—the one that’s supposed to beef up our defenses against ransomware. It’s like $5,000 … Read more

Heard of Syncjacking? Your Home Browser infects your work Browser!!

  Here is the info from Grok copied verbatim: (from a specific question regarding syncjacking) ————————————————————————————————— Browser sync features, such as those in Google Chrome, allow users to synchronize data like passwords, bookmarks, browsing history, and extensions across devices via a cloud account. However, this convenience can be exploited by malware and criminals to circumvent … Read more

What Makes Phishing so effective?

  There are some Docusign phishing attempts as catalogued here at Malwarebytes.com    How can one really tell that it is not a legitimate Docusign instead of a fake site or fake email Looking at the true email address from section shows where the email is coming from (not the email name “from:” that you … Read more

What if We are Losing Cybersecurity War?

What is Cybersecurity?  Is it the way one uses and defends their data and systems? CISA the government agency (not my certifications Certified Information Systems Auditor by ISACA) … I know confusing right? https://www.cisa.gov/news-events/news/what-cybersecurity  I like to show you the full link so you know where you are going(not like phishing scams). Cybersecurity is explained … Read more