Subscribe

Updated Ransomware Plays Hide and Seek


Posted March 30, 2017 in Ransomware, Malware, Data Breach

Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new...

Wikileaks Dump Shows iPhone Vulnerabilities Exploited by CIA


Posted March 30, 2017 in Malware, Data Breach, AI

WikiLeaks’ DarkMatter dump brought some interesting revelations to light, most notably was the fact that the CIA has...

New Kind Ransomware, Scareware, on Safari


Posted March 28, 2017 in Ransomware, Compliance, Malware

Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee...

A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?


Posted March 27, 2017 in Data Breach, Cloud Security, AI

There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause...

Cloud Computing: The Fall of Hospital Datacenters


Posted March 23, 2017 in Cloud Security, HIPAA, Data Breach

Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way...

iPhone Users Double-Victimized


Posted March 23, 2017 in Malware, Data Breach, AI

iPhone thieves may be able to pick up an iPhone, but thanks to “Find my iPhone,” breaking into them is such a...

Restaurants Easy Targets for Credit Card Fraud


Posted March 23, 2017 in Data Breach, Malware, Cloud Security

Google algorithms helped identify the source of a massive credit card breach - for the second time in just nine...

Cybersecurity Firm Newest Phishing Victim


Posted March 23, 2017 in Data Breach, Malware, Cloud Security

You think only “regular” citizens can fall victim to tax phishing scams?  Think again. Last Thursday, George...