Subscribe
Ransomware Hits North Carolina and Connecticut Cities

Ransomware Hits North Carolina and Connecticut Cities


Posted October 30, 2018 in Malware, Cryptocurrency, Digital Forensics, Ransomware, Bitcoin

Ransomware attacks struck cities in North Carolina and Connecticut, infecting dozens of servers. Learn how...

5 IT Security Best Practices Every Business Needs

5 IT Security Best Practices Every Business Needs


Posted October 25, 2018 in Data Breach, Malware, Cloud Security

Protect your business from hacking, malware, and data theft with these five proven IT security best practices. Start...

One Security Trick Nobody Uses (But Everyone Should)

One Security Trick Nobody Uses (But Everyone Should)


Posted October 24, 2018 in Malware, Data Breach, Cloud Security

Cybercrime costs over $2 trillion yearly, yet one simple security measure is ignored by most. Discover this...

Implanted Microchips: The Future of Digital Identity

Implanted Microchips: The Future of Digital Identity


Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach

Thousands of people in Sweden have implanted NFC microchips for payments and ID. Explore the security and privacy...

Chinese Spy Chips Found on US Server Hardware

Chinese Spy Chips Found on US Server Hardware


Posted October 5, 2018 in Data Breach, Malware, Cloud Security

Tiny Chinese spy chips were discovered embedded in US server hardware. See how supply chain attacks threaten national...

Unsecured Webcams: How Hackers Watch You (Fix It Now)

Unsecured Webcams: How Hackers Watch You (Fix It Now)


Posted October 4, 2018 in Data Breach, Work from Home, Malware

Unsecured webcams let hackers spy on your home and office. Learn the default settings that leave you exposed and the...

Hurricane IT Preparedness Checklist for Business

Hurricane IT Preparedness Checklist for Business


Posted September 11, 2018 in Data Breach, Cloud Security, Malware

Flooding and power outages can destroy business equipment and data in hours. Use this IT hurricane preparedness...

Smart Home Hijacking: Secure Your IoT Devices

Smart Home Hijacking: Secure Your IoT Devices


Posted September 6, 2018 in Malware, Data Breach, AI

Your smart home devices could give criminals a backdoor into your network. Discover how to lock down IoT devices and...