Cybersecurity Blog


Subscribe

Category: Cybersecurity

IoT Security Threats: Why Smart Devices Are Risky

IoT Security Threats: Why Smart Devices Are Risky


Posted January 31, 2017 in Malware, Data Breach, Cloud Security

From smart fridges to connected cars, IoT devices create massive security gaps. Discover the biggest Internet of...

Trump's Executive Order on Cybersecurity Explained

Trump's Executive Order on Cybersecurity Explained


Posted January 30, 2017 in Data Breach, Compliance, Cloud Security

A leaked draft of President Trump's cybersecurity executive order revealed sweeping policy changes. Learn what the...

Phone Scam Alert: Hang Up If You Hear This

Phone Scam Alert: Hang Up If You Hear This


Posted January 30, 2017 in Data Breach, Malware, Digital Forensics

A dangerous phone scam records your voice saying yes to authorize fraudulent charges. Learn what to do if you receive...

Hacktivism Explained: Ethics of Vigilante Hacking

Hacktivism Explained: Ethics of Vigilante Hacking


Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach

The Popcorn Time ransomware let victims unlock files by infecting others. Explore the murky ethics of hacktivism and...

Ransomware Found on Google Play Store

Ransomware Found on Google Play Store


Posted January 25, 2017 in Ransomware, Malware, Data Breach

A ransomware app bypassed Google Play security and infected Android devices. Discover how malicious apps slip through...

Charter Spectrum's Dangerous WiFi Security Advice

Charter Spectrum's Dangerous WiFi Security Advice


Posted January 25, 2017 in Data Breach, Malware, Cloud Security

Charter Spectrum told customers to share WiFi passwords for sports loyalty. Learn why this terrible security advice...

200,000 Servers Still Vulnerable to Heartbleed

200,000 Servers Still Vulnerable to Heartbleed


Posted January 23, 2017 in Malware, Data Breach, Cloud Security

Nearly 200,000 servers remain exposed to the Heartbleed vulnerability years after discovery. Find out if your systems...

Student Faces 10 Years for Keylogger Attack

Student Faces 10 Years for Keylogger Attack


Posted January 16, 2017 in Cryptocurrency, Bitcoin, Malware, Data Breach

A college student used keylogger malware to steal credentials and change grades. Learn how this cyberattack unfolded...

Ransomware Uses Extortion-Style Tactics

Ransomware Uses Extortion-Style Tactics


Posted January 12, 2017 in Ransomware, Malware, Data Breach

New ransomware variants mimic classic extortion schemes, demanding payment to unlock your files. Discover proven...

Russian Hackers Shut Down a City's Power Grid

Russian Hackers Shut Down a City's Power Grid


Posted January 11, 2017 in Data Breach, Digital Forensics, Cloud Security

A major city lost power for over an hour after a cyberattack affecting 200,000+ people. Learn how Russian hackers...

FBI Censors Key Documents: What They Hide

FBI Censors Key Documents: What They Hide


Posted January 10, 2017 in Data Breach, Digital Forensics, Compliance

The FBI redacted critical details from released documents tied to the San Bernardino case. Discover what was censored...

Russian Malware Found in Vermont Utility

Russian Malware Found in Vermont Utility


Posted January 10, 2017 in Malware, Data Breach, Cloud Security

Malware linked to Russian cyberattacks was discovered on a Vermont utility laptop. Learn how investigators trace...