Critical HTTP/2 Vulnerabilities Discovered
Posted August 4, 2016 in Malware, Data Breach, Cloud Security
Researchers found major security flaws in HTTP/2 that undermine its safety claims. Learn what these vulnerabilities...
PayPal Phishing Scam Uses Legit Email Accounts
Posted August 2, 2016 in Malware, Data Breach, Cloud Security
Cybercriminals now send phishing links from real PayPal accounts with fake payment requests. Learn to spot this...
Russian Hackers and Voting Machines: Election Risk
Posted August 1, 2016 in Data Breach, Malware, Cloud Security
Could foreign hackers compromise US voting machines? Explore the real cybersecurity threats to election...
Small Business Cyberattacks: Why You Are a Target
Posted July 28, 2016 in Data Breach, Cloud Security, Malware
Hackers increasingly target small businesses with weaker defenses. Learn the latest attack trends and proven steps to...
Biometric Security: Convenience vs. Privacy Risk
Posted July 28, 2016 in Data Breach, Malware, Cloud Security
Fingerprint and facial recognition unlock devices fast, but biometric data breaches are permanent. Weigh the real...
Every Windows Password Cracked in Under 6 Hours
Posted July 27, 2016 in Malware, AI, Cloud Security
A security researcher built a machine that cracks any Windows password in six hours. Learn why this matters and how...
Wireless Keyboard Hack: Passwords Stolen Over Air
Posted July 27, 2016 in Data Breach, AI, Cloud Security
Cheap wireless keyboards transmit keystrokes hackers can intercept from 250 feet away. Find out if your keyboard is...
LastPass Vulnerability Could Expose All Your Passwords
Posted July 27, 2016 in Malware, Data Breach, Cloud Security
A critical LastPass vulnerability could give hackers access to every stored password. Learn what happened and how to...