Mobile Phone Account Hijacking
Posted June 28, 2016 in Compliance, Data Breach, Malware
By hijacking mobile phone accounts, identity thieves have found a new and easy way to make money. This new technique...
Intel CEO Acknowledges Uselessness of its Antivirus
Posted June 28, 2016 in Ransomware, Malware, Data Breach
If at first you don’t succeed, try, try again, right? Sometimes, the answer is just no, as is the case with Intel...
Healthcare Industry is the Ultimate Cyber Attack Target
Posted June 24, 2016 in Ransomware, HIPAA, Data Breach
If you have been following this blog, you know that hospitals have become a major target of cybercriminals this year....
Cyber Ransom Liability Insurance
Posted June 21, 2016 in Ransomware, HIPAA, Compliance
As our blog's history shows, the healthcare industry has become an increasingly popular ransomware target for...
Invisible ATM Skimmers
Posted June 16, 2016 in Data Breach, Malware, Cloud Security
It was recently reported that credit card skimmers were being found at Walmart stores. Now we have video of skimmers...
HIPAA Misunderstandings in the Wake of Orlando Tragedy
Posted June 16, 2016 in HIPAA, Compliance, NIST
With the tragic events that unfolded in Orlando at the Pulse nightclub, a lot of questions about LGBT safety, gun...
Hackers Find Scores of Pentagon Vulnerabilities
Posted June 15, 2016 in Penetration Testing, Data Breach, Malware
Over 100 weaknesses have been found in the Pentagon's networks and websites. Fortunately, these hackers were paid to...
How the NSA Used MS Word Macros
Posted June 13, 2016 in Compliance, Ransomware, Malware, Data Breach
There have been new revelations about the US government’s spy program thanks to a series of Edward Snowden’s emails...