Hang Up Your Phone Immediately if You Hear This...
Posted January 30, 2017 in Data Breach, Malware, Digital Forensics
The phone rings. The number isn't familiar, but the area code is, so you decide to answer the call. You answer:...
Rude Trojan Turns Linux Machines into Proxies
Posted January 26, 2017 in Malware, Data Breach, Compliance
A new Trojan allows hackers to hide their IP addresses, allowing them to carry out whatever nefarious online deeds...
The Murky Waters of Hacktivism
Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach
We wrote a post about a form of ransomware called ‘Popcorn Time’ that delivered the encryption key to the original...
Ransomware on Google Play
Posted January 25, 2017 in Ransomware, Malware, Data Breach
Malware slipping through to become available on Google Play, Android's marketplace, is nothing new. Now, however, a...
Charter's Terrible Security Advice
Posted January 25, 2017 in Data Breach, Malware, Cloud Security
"Change your WiFi password and show guests where your loyalty lies! #ThatsMyTeam." That was a message from Charter...
200,000 Vulnerable Servers
Posted January 23, 2017 in Malware, Data Breach, Cloud Security
Do you remember the Heartbleed vulnerability? It's been known about for almost three years now, yet there are still...
Gmail Scam Even Fooling Experts
Posted January 19, 2017 in Malware, Data Breach, Compliance
There's a new phishing scam going around aimed at stealing your Gmail password. The scary thing is that even...
Student Faces 10 Years for Keylogger Malware
Posted January 16, 2017 in Cryptocurrency, Bitcoin, Malware, Data Breach
Imagine you won a Programmer of the Year Award in high school. You get into James Madison University. You get an...