Cybersecurity Blog


Subscribe

Category: Cybersecurity

How Minecraft Links to State-Sponsored Hacking

How Minecraft Links to State-Sponsored Hacking


Posted March 20, 2017 in Malware, Data Breach, Cloud Security

State-sponsored hackers used gaming platforms and social engineering to target victims. Discover the surprising...

WikiLeaks CIA Vault 7 Dump: The Five W's Explained

WikiLeaks CIA Vault 7 Dump: The Five W's Explained


Posted March 15, 2017 in Malware, Data Breach, AI

WikiLeaks released thousands of classified CIA hacking documents in the Vault 7 dump. Get the who, what, when, where,...

UK Fears Russian Cyberattacks on Elections

UK Fears Russian Cyberattacks on Elections


Posted March 14, 2017 in Data Breach, Cloud Security, Malware

After suspected US election interference, the UK fears Russian cyberattacks targeting its political system. Learn how...

Can Blockchain Stop Ransomware in Healthcare?

Can Blockchain Stop Ransomware in Healthcare?


Posted March 8, 2017 in Blockchain, Ransomware, Cryptocurrency, Bitcoin, HIPAA, Data Breach

IEEE and PCHA explored blockchain as a defense against healthcare ransomware at HIMSS17. Discover how blockchain...

Top 10 Worst Passwords of 2016 Revealed

Top 10 Worst Passwords of 2016 Revealed


Posted March 6, 2017 in Data Breach, Malware, Cloud Security

The most popular passwords of 2016 reveal alarming security habits. See if your password made the list and learn how...

Did Obama Leave a Cybersecurity Gift for Russia?

Did Obama Leave a Cybersecurity Gift for Russia?


Posted March 2, 2017 in Data Breach, AI, Malware

Questions remain about US cybersecurity posture during the presidential transition. Explore the controversial...

Critical Linux Kernel Bug Threatens Servers

Critical Linux Kernel Bug Threatens Servers


Posted March 1, 2017 in Data Breach, Malware, AI

A privilege-escalation Linux kernel vulnerability puts servers at risk of full compromise. Learn if your systems are...

Fake Font Update Installs Virus on Chrome Users

Fake Font Update Installs Virus on Chrome Users


Posted March 1, 2017 in Ransomware, Malware, Data Breach

A clever scam tricks Chrome users into installing malware disguised as a missing font update. Learn how this social...

Turn Employees Into Cybersecurity Assets, Not Risks

Turn Employees Into Cybersecurity Assets, Not Risks


Posted February 24, 2017 in Ransomware, Malware, HIPAA, Data Breach

Employee mistakes are the top cause of data breaches. Learn how to transform your workforce from a cybersecurity...

Deadly Ransomware Targets Small Businesses

Deadly Ransomware Targets Small Businesses


Posted February 24, 2017 in Ransomware, Malware, Data Breach

Ransomware is devastating small businesses and healthcare organizations with crippling attacks. Learn the 5 critical...

Work Email Is More Dangerous Than Personal Email

Work Email Is More Dangerous Than Personal Email


Posted February 20, 2017 in Malware, Data Breach, Cryptocurrency

Analysis of 1 billion+ emails reveals work email carries far more threats than personal accounts. Discover why...

Why Hackers Always Have the Upper Hand

Why Hackers Always Have the Upper Hand


Posted February 20, 2017 in Ransomware, Data Breach, Cloud Security

No matter your defenses, hackers start with an advantage. Backups, firewalls, and insurance are not enough. Discover...