Hacking with Sound
Posted September 8, 2016 in Malware, Data Breach, Cloud Security
What do Tibetan monks, sophisticated hackers and famous rock stars all have in common? The ability to harvest...
Hillary Clinton's Lost Laptop
Posted September 6, 2016 in AI, Cloud Security, Data Breach
If Hilary Clinton’s email troubles weren't bad enough, it appears that two archive of her emails, one on a laptop and...
68 Million Dropbox Accounts Leaked: What to Do Now
Posted August 31, 2016 in Data Breach, Malware, Compliance
The 2012 Dropbox hack was far worse than reported, with 68 million accounts compromised. Learn if you were affected...
New Malware Makes iPhone Tell Spies EVERYTHING
Posted August 29, 2016 in Malware, Data Breach, AI
A newly discovered piece off malware that was created by the NSO Group, a sketchy company that builds hacking tools...
Cisco's ExtraBacon Exploit
Posted August 24, 2016 in Data Breach, Malware, Compliance
Last week we reported on the newly found exploit in Cisco System firewalls that was part of the data dump of stolen...
Russian Spies Targeting News Organizations
Posted August 24, 2016 in Data Breach, Digital Forensics, Malware
Apparently the Russians really want Donald Trump to be the next President of the United States. The FBI, in tandem...
75% of Data Breaches Are Easily Preventable: Here's How
Posted August 18, 2016 in Malware, Data Breach, Cloud Security
Over 75% of data breaches in 2015 were caused by stolen or weak credentials. Learn the simple steps that prevent most...
Cisco Updates Thanks to NSA Hack
Posted August 18, 2016 in Data Breach, Malware, Cloud Security
Thanks to a data dump stolen from what most believe to be a shadowy arm of the NSA, Cisco is developing a patch for a...