Trending Threat: Internet of Things
Posted January 31, 2017 in Malware, Data Breach, Cloud Security
By now, people are becoming more familiar with the term IoT, or the Internet of Things, where everything from cars to...
Trump Executive Order on Cybersecurity
Posted January 30, 2017 in Data Breach, Compliance, Cloud Security
The Washington Post published a document that appears to be a draft of an executive order from President Donald Trump...
Hang Up Your Phone Immediately if You Hear This...
Posted January 30, 2017 in Data Breach, Malware, Digital Forensics
The phone rings. The number isn't familiar, but the area code is, so you decide to answer the call. You answer:...
Rude Trojan Turns Linux Machines into Proxies
Posted January 26, 2017 in Malware, Data Breach, Compliance
A new Trojan allows hackers to hide their IP addresses, allowing them to carry out whatever nefarious online deeds...
The Murky Waters of Hacktivism
Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach
We wrote a post about a form of ransomware called ‘Popcorn Time’ that delivered the encryption key to the original...
Ransomware on Google Play
Posted January 25, 2017 in Ransomware, Malware, Data Breach
Malware slipping through to become available on Google Play, Android's marketplace, is nothing new. Now, however, a...
Charter's Terrible Security Advice
Posted January 25, 2017 in Data Breach, Malware, Cloud Security
"Change your WiFi password and show guests where your loyalty lies! #ThatsMyTeam." That was a message from Charter...
200,000 Vulnerable Servers
Posted January 23, 2017 in Malware, Data Breach, Cloud Security
Do you remember the Heartbleed vulnerability? It's been known about for almost three years now, yet there are still...