Nuclear Power Plant Cyberattack: Critical Infrastructure at Risk
Posted October 17, 2016 in Malware, Data Breach, Compliance
Hackers targeted a nuclear power plant, raising fears of catastrophic infrastructure attacks. Learn why critical...
Cyberattack Economics: How Supply and Demand Drive Hacking
Posted October 13, 2016 in Data Breach, HIPAA, Compliance
The dark web marketplace follows supply and demand just like any economy. Understand the economics behind...
Aetna Healthcare Cybersecurity: Proactive Breach Defense Model
Posted October 13, 2016 in HIPAA, Data Breach, Cloud Security
Aetna uses analytics to scan data dumps and protect employee credentials proactively. Learn their innovative approach...
Yahoo Data Breach Fallout: Verizon Demands $1B Discount
Posted October 13, 2016 in Data Breach, Malware, Compliance
Verizon sought a billion-dollar discount after Yahoo revealed massive data breaches. See how cybersecurity failures...
Mac Webcam Spyware: Why Apple Users Are Not Safe
Posted October 12, 2016 in Ransomware, Malware, Data Breach
New malware secretly activates Mac webcams without triggering the indicator light. Discover why Mac users face...
ATM Hacking Scheme: Romanian Cybercriminal Steals $2 Million
Posted October 12, 2016 in Malware, Data Breach, Compliance
A Romanian hacker stole $2M from ATMs before London police caught him. See how ATM skimming attacks work and how to...
Yahoo Email Surveillance: Government-Ordered User Scanning Exposed
Posted October 11, 2016 in Malware, Data Breach, Compliance
Yahoo secretly built software to scan millions of user emails for US intelligence. Learn how government surveillance...
Turkey Censors Google, Microsoft Cloud Services
Posted October 10, 2016 in Data Breach, Compliance, Cloud Security
Turkey blocked access to Google Drive, Microsoft OneDrive, Dropbox, and GitHub. Learn why authoritarian censorship of...