© 2019 InZero Systems

Welcome to

Our Blog

Once upon a time, North Korea only cared about cyber espionage. Most of the time, they wanted to spy on South Korea or disrupt South Korean operations. Then, a terrible thing happened.

May 6 2019

Bad apps keep getting through; according to Google, less than 1%. Nonetheless, 1% of 1 billion is still 10 million… just saying.  Notice that apps containing Trojans lead the way, and that’s not good. These apps release malware that can quickly gain control of your device. These are often RATs (Remote Access Trojans) which enable hackers to control your device remotely.

April 8, 2019

fake-anti_edited.jpg

If the Citrix hack really did come from the Iranian government, we should expect some attacks on key U.S. government agencies in the future. Stay tuned. This could be an interesting year in cybersecurity.

March 18, 2019

citrix.jpg

Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. .

March 11, 2019

Algorithms could be manipulated to have weapons misfire or fire on the wrong target . . . A database, itself, could be infected to make algorithms reach dangerous conclusions

March 11, 2019

When Algorithms Go Bad

The scenario outlined above highlights the sensitivity of algorithms to manipulation by nefarious agents. Algorithms could be manipulated to have weapons misfire or fire on the wrong target,

February 25, 2019

It’s Hacking Season in Tibet

At the time of this writing, SpeakUp is being used to install cryptomining software, however, few researchers believe this is its ultimate goal, as it has the sophisticated architecture to launch a far more devastating worldwide attack.

February 18, 2019

5 Surprising and mostly Unknown Cyber Security Facts

Clicking on one of the options shown above will take you to these fake survey sites or to sites offering free gift cards to well known stores. All you have to do is give them some personal information.

February 11, 2019

The point is to get you interested in the subject line, abandon normal caution, and open the inviting attachment. Sadly, you will find no love there.

February 4, 2019

“Love You” Phishing Emails Arrive in Time for Valentine’s Day

Most companies and organizations simply can’t compete with the hackers behind these attacks. If a breach actually occurs, the F.B.I. suggests you work with them.  

January 28, 2019

The Business Process Compromise: The Cyber Attack You Don’t See Coming

Billions are being made by these extortionists because ransomware is the easiest way for hackers to get a quick payoff. If cyber insurance companies guarantee ransom payments, they, in effect, guarantee an income for novice hackers around the globe. 

January 21, 2019

Cyber Insurance Firms Fund Malware Development