Cyber Security, Identity Theft, TOOLS & TRENDS

Bluetooth Vulnerabilities and How to Protect Your Devices

On Tuesday, researchers uncovered major Bluetooth vulnerabilities that could threaten billions of devices  using the short-range wireless protocol. The vulnerabilities could affect a myriad of smart devices ranging from Android or Apple smartphones to printers, smart TVs and IoT devices. The IoT security firm, Armis has uncovered a bug deemed the “BlueBorne” attack. The attack

Read More...

Cyber Security, Identity Theft, TOOLS & TRENDS

Public WiFi Safety Tips

In this age of instant access, we’re all guilty of using a Public “Hotspot” for WiFi at one point or another. Unfortunately we as a trusting species, are under the impression that our photos, personal email accounts and our private discussions via chat rooms or instant messenger are private using a public WiFi Hotspot. But

Read More...

Legal, TOOLS & TRENDS

Title IX Investigations

We’ve all watched the made for TV dramas where a young co-ed is silenced by the school board, made to believe that she has no case because of her behavior. But even fiction is based on some form of fact. Title IX Investigation involves looking into or debunking accusations of sexual discrimination in all federally

Read More...

Cyber Security, TOOLS & TRENDS

WannaCry Ransomware A Global Attack

Ransomware has struck again, impacting major networks across the world. By Friday the bug known as WannaCry, a.k.a. Wcry locked an estimated 200,000 computers throughout 150 regions across the globe. Russia, the Ukraine and Taiwan were among the Countries hit especially hard. Notorious for supporting over 24 different languages to deliver ransome messages, this self-replicating

Read More...

Cyber Security, Identity Theft, TOOLS & TRENDS

Medical Identity Theft

The rising crime of Medical Identity Theft Medical Identity Theft is a growing trend among cyber criminals that is quickly becoming the biggest target among identity thieves. Whether there was a lack of use of data encryption technology, insider breaches or unauthorized access and hacking of health care provider technology, the theft of medical information

Read More...

Corporate Investigation, TOOLS & TRENDS

Insurance Fraud Investigation

Insurance Fraud investigation isn’t exclusive to the industry. What the average person may not realize, is that a good majority of fraudulent insurance claims, implicate a second party. These fraudulent claims can cost the victim an increase in premiums, legal fees and expensive payouts. Private citizens and businesses alike can benefit from hiring a private

Read More...