Subscribe

Mac Users Face Rising Ransomware Threats


Posted November 15, 2018 in Ransomware, Malware, Data Breach

Apple systems are no longer immune to ransomware. A new study shows Mac-targeted attacks are surging. Learn how to...

Ransomware Hits North Carolina and Connecticut Cities


Posted October 30, 2018 in Malware, Cryptocurrency, Digital Forensics, Ransomware, Bitcoin

Ransomware attacks struck cities in North Carolina and Connecticut, infecting dozens of servers. Learn how...

5 IT Security Best Practices Every Business Needs


Posted October 25, 2018 in Data Breach, Malware, Cloud Security

Protect your business from hacking, malware, and data theft with these five proven IT security best practices. Start...

One Security Trick Nobody Uses (But Everyone Should)


Posted October 24, 2018 in Malware, Data Breach, Cloud Security

Cybercrime costs over $2 trillion yearly, yet one simple security measure is ignored by most. Discover this...

Implanted Microchips: The Future of Digital Identity


Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach

Thousands of people in Sweden have implanted NFC microchips for payments and ID. Explore the security and privacy...

Chinese Spy Chips Found on US Server Hardware


Posted October 5, 2018 in Data Breach, Malware, Cloud Security

Tiny Chinese spy chips were discovered embedded in US server hardware. See how supply chain attacks threaten national...

Unsecured Webcams: A Hidden Doorway for Hackers

Unsecured Webcams: A Hidden Doorway for Hackers


Posted October 4, 2018 in Data Breach, Work from Home, Malware

Default webcam settings leave you exposed to hackers and criminals. Security expert Craig Petronella explains how to...

Hurricane IT Preparedness Checklist for Business


Posted September 11, 2018 in Data Breach, Cloud Security, Malware

Flooding and power outages can destroy business equipment and data in hours. Use this IT hurricane preparedness...