$5 Devices Grants Access to Locked Computers
Posted November 16, 2016 in Data Breach, Cloud Security, Malware
Most people don't give a second thought to leaving their computer alone for a bit, feeling secure that if it's locked...
How to Hack a Linux Machine in 70 Seconds
Posted November 16, 2016 in Data Breach, Cloud Security, Malware
Want to hack a Linux computer? It's takes just over a minute and it's so simple a toddler could do it. (Not that a...
Stage Your Own DDoS Attack
Posted November 14, 2016 in Malware, Data Breach, Cloud Security
A DDoS (Domain Denial of Service) attack happens when a network is flooded with requests. One common way to do this...
Protecting from Election Hacking
Posted November 8, 2016 in Data Breach, Cloud Security, Malware
There's no question that a lot of people have been paying close attention to the presidential election this year....
Don't Call that Support Number
Posted November 7, 2016 in Malware, Data Breach, Cloud Security
You PC just froze. An official-looking message that appears to be from Microsoft pops up and tells you to call a...
Hospital Hampered by Hackers
Posted November 3, 2016 in Ransomware, Malware, Data Breach
A hospital in the United Kingdom was forced to divert trauma patients and cancel planned operations on Wednesday...
Stealing with the Internet of Things
Posted November 3, 2016 in Malware, Data Breach, Cloud Security
As we get more and more accustomed to the convenience of our everyday objects having network capabilities in the...
Ransomware and Malware Top Healthcare IT Concerns
Posted November 1, 2016 in Ransomware, Malware, HIPAA, Data Breach
According to a recent study conducted by the College of Healthcare Information Management Executives (CHIME) and the...