Subscribe
Critical WordPress Vulnerability: Update Now

Critical WordPress Vulnerability: Update Now


Posted February 14, 2017 in Malware, Data Breach, Cloud Security

A critical WordPress security flaw puts millions of websites at risk. Learn why you must update immediately and how...

Word Macro Malware Now Targets Mac Computers

Word Macro Malware Now Targets Mac Computers


Posted February 10, 2017 in Malware, Data Breach, AI

Hackers expanded Word macro malware from Windows to Mac. Discover how this cross-platform threat works and what Mac...

Fileless Malware: The Invisible Threat

Fileless Malware: The Invisible Threat


Posted February 9, 2017 in Malware, Data Breach, Cloud Security

Fileless malware evades antivirus by running entirely in memory without copying files to your hard drive. Learn how...

CEO Fraud: 2 More Companies Fall Victim

CEO Fraud: 2 More Companies Fall Victim


Posted February 7, 2017 in HIPAA, Data Breach, Malware

Two more companies lost sensitive data to CEO fraud scams where criminals impersonated executives. Learn how business...

Fake Netflix App Spreads Dangerous Malware

Fake Netflix App Spreads Dangerous Malware


Posted February 6, 2017 in Ransomware, Malware, Data Breach

A fake Netflix app promising free access is actually malware designed to steal your data. Learn how to spot...

Police Lose 8 Years of Evidence to Ransomware

Police Lose 8 Years of Evidence to Ransomware


Posted February 3, 2017 in Ransomware, Digital Forensics, Data Breach

A police department lost eight years of digital evidence after refusing to pay a ransomware demand. Discover why law...

Ransomware Shuts Down Entire County Government

Ransomware Shuts Down Entire County Government


Posted February 3, 2017 in Ransomware, Malware, Data Breach

Licking County, Ohio was forced offline by a ransomware attack that crippled police and government offices. Learn how...

Best Cybersecurity Movies, Shows & Books to Enjoy

Best Cybersecurity Movies, Shows & Books to Enjoy


Posted February 2, 2017 in Data Breach, Digital Forensics, Compliance

Looking for cybersecurity entertainment? Explore our curated list of the best hacker movies, TV shows, and books...