Cybersecurity Blog


Subscribe

Category: Cybersecurity

PayPal Phishing Scam Uses Legit Email Accounts

PayPal Phishing Scam Uses Legit Email Accounts


Posted August 2, 2016 in Malware, Data Breach, Cloud Security

Cybercriminals now send phishing links from real PayPal accounts with fake payment requests. Learn to spot this...

Russian Hackers and Voting Machines: Election Risk

Russian Hackers and Voting Machines: Election Risk


Posted August 1, 2016 in Data Breach, Malware, Cloud Security

Could foreign hackers compromise US voting machines? Explore the real cybersecurity threats to election...

Small Business Cyberattacks: Why You Are a Target

Small Business Cyberattacks: Why You Are a Target


Posted July 28, 2016 in Data Breach, Cloud Security, Malware

Hackers increasingly target small businesses with weaker defenses. Learn the latest attack trends and proven steps to...

Biometric Security: Convenience vs. Privacy Risk

Biometric Security: Convenience vs. Privacy Risk


Posted July 28, 2016 in Data Breach, Malware, Cloud Security

Fingerprint and facial recognition unlock devices fast, but biometric data breaches are permanent. Weigh the real...

DNC WikiLeaks Hack: Innocent Victims Exposed

DNC WikiLeaks Hack: Innocent Victims Exposed


Posted July 26, 2016 in Data Breach, Compliance, Cloud Security

The WikiLeaks DNC data dump exposed innocent bystanders alongside political secrets. Discover who was affected and...

Security Analyst Careers: High Demand, Top Salaries

Security Analyst Careers: High Demand, Top Salaries


Posted July 26, 2016 in Ransomware, HIPAA, Data Breach

Information security analyst jobs are booming due to rising cyber threats. Explore career opportunities, salary data,...

5 Critical Cybersecurity Gaps in Healthcare

5 Critical Cybersecurity Gaps in Healthcare


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

A two-year study reveals healthcare organizations are dangerously unprepared for cyberattacks. See the top 5 concerns...

Why SMS Two-Factor Authentication Is No Longer Safe

Why SMS Two-Factor Authentication Is No Longer Safe


Posted July 26, 2016 in Data Breach, Malware, Cloud Security

Text-based two-factor authentication is being phased out due to security risks. Learn why SMS codes are vulnerable...

DNC Email Hack: Russian Hackers Behind the Breach?

DNC Email Hack: Russian Hackers Behind the Breach?


Posted July 26, 2016 in Data Breach, Digital Forensics, Cloud Security

Nearly 20,000 DNC emails leaked by WikiLeaks, with Russian hackers suspected. Analyze the evidence and understand the...

Locky Ransomware Now Works Offline: What to Know

Locky Ransomware Now Works Offline: What to Know


Posted July 22, 2016 in Ransomware, Malware, Cloud Security

The Locky ransomware strain now encrypts files without an internet connection. This dangerous evolution makes it...

Police Use 3D-Printed Fingerprint to Unlock Phone

Police Use 3D-Printed Fingerprint to Unlock Phone


Posted July 22, 2016 in Data Breach, Digital Forensics, Malware

Law enforcement 3D-printed a fingerprint to unlock a murder victim's phone. This breakthrough raises serious...

Fake WiFi Networks Exposed at the RNC Convention

Fake WiFi Networks Exposed at the RNC Convention


Posted July 22, 2016 in Data Breach, Malware, Cloud Security

Security researchers set up fake WiFi networks at the Republican National Convention to test attendees. The results...