Mobile Account Hijacking: A New Identity Theft Threat
Posted June 28, 2016 in Compliance, Data Breach, Malware
Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...
Intel Admits Its Antivirus Software Is Useless
Posted June 28, 2016 in Ransomware, Malware, Data Breach
Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...
Why Healthcare Is the #1 Cyber Attack Target
Posted June 24, 2016 in Ransomware, HIPAA, Data Breach
Hospitals and medical practices are the top targets for cybercriminals. Discover why healthcare data is so valuable...
Cyber Ransom Insurance: Does Your Business Need It?
Posted June 21, 2016 in Ransomware, HIPAA, Compliance
With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...
Invisible ATM Skimmers: How to Protect Your Cards
Posted June 16, 2016 in Data Breach, Malware, Cloud Security
New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...
HIPAA Rules After a Tragedy: Common Misconceptions
Posted June 16, 2016 in HIPAA, Compliance, NIST
The Orlando tragedy raised questions about HIPAA and patient information sharing. Learn the common misconceptions...
Pentagon Bug Bounty Reveals 100+ Vulnerabilities
Posted June 15, 2016 in Penetration Testing, Data Breach, Malware
1,400 hackers found over 100 weaknesses in Pentagon networks through a sanctioned bug bounty program. See what they...
NSA Exploited MS Word Macros for Surveillance
Posted June 13, 2016 in Compliance, Ransomware, Malware, Data Breach
Snowden emails reveal how the NSA weaponized Microsoft Word macros for spying. Discover the government surveillance...