Subscribe
Mobile Account Hijacking: A New Identity Theft Threat

Mobile Account Hijacking: A New Identity Theft Threat


Posted June 28, 2016 in Compliance, Data Breach, Malware

Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...

Intel Admits Its Antivirus Software Is Useless

Intel Admits Its Antivirus Software Is Useless


Posted June 28, 2016 in Ransomware, Malware, Data Breach

Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...

Why Healthcare Is the #1 Cyber Attack Target

Why Healthcare Is the #1 Cyber Attack Target


Posted June 24, 2016 in Ransomware, HIPAA, Data Breach

Hospitals and medical practices are the top targets for cybercriminals. Discover why healthcare data is so valuable...

Cyber Ransom Insurance: Does Your Business Need It?

Cyber Ransom Insurance: Does Your Business Need It?


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...

Invisible ATM Skimmers: How to Protect Your Cards

Invisible ATM Skimmers: How to Protect Your Cards


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...

HIPAA Rules After a Tragedy: Common Misconceptions

HIPAA Rules After a Tragedy: Common Misconceptions


Posted June 16, 2016 in HIPAA, Compliance, NIST

The Orlando tragedy raised questions about HIPAA and patient information sharing. Learn the common misconceptions...

Pentagon Bug Bounty Reveals 100+ Vulnerabilities

Pentagon Bug Bounty Reveals 100+ Vulnerabilities


Posted June 15, 2016 in Penetration Testing, Data Breach, Malware

1,400 hackers found over 100 weaknesses in Pentagon networks through a sanctioned bug bounty program. See what they...

NSA Exploited MS Word Macros for Surveillance

NSA Exploited MS Word Macros for Surveillance


Posted June 13, 2016 in Compliance, Ransomware, Malware, Data Breach

Snowden emails reveal how the NSA weaponized Microsoft Word macros for spying. Discover the government surveillance...