Cybersecurity Blog


Subscribe

Category: Cybersecurity

Satana Malware: Two Viruses Combined Into One

Satana Malware: Two Viruses Combined Into One


Posted July 14, 2016 in Ransomware, Malware, Data Breach

Satana malware merges two aggressive ransomware strains into one devastating threat. Understand this dangerous hybrid...

Amazon Server Breach Exposes 80,000 User Accounts

Amazon Server Breach Exposes 80,000 User Accounts


Posted July 11, 2016 in Penetration Testing, Data Breach, Cloud Security

A hacker released 80,000 Amazon usernames and passwords after Amazon ignored vulnerability warnings. See what...

YouTube Videos Can Actually Hack Your Smartphone

YouTube Videos Can Actually Hack Your Smartphone


Posted July 11, 2016 in Data Breach, Digital Forensics, Malware

University researchers prove YouTube videos can be weaponized to hack smartphones and steal personal data. Learn how...

Congress Declares War on Ransomware Attacks

Congress Declares War on Ransomware Attacks


Posted July 6, 2016 in Ransomware, Data Breach, Malware, HIPAA

Bipartisan legislation targets the growing ransomware epidemic. Learn what Congress is doing to fight back and how it...

Fake Software Site Steals Government Credentials

Fake Software Site Steals Government Credentials


Posted July 6, 2016 in Malware, Data Breach, Cloud Security

A seemingly legitimate software website secretly harvested government login credentials via keyloggers. Learn the...

Ransomware on Mobile: Your Phone Is Not Safe

Ransomware on Mobile: Your Phone Is Not Safe


Posted June 30, 2016 in Ransomware, Malware, Data Breach

Ransomware has spread from computers to smartphones. Learn how mobile ransomware works, which devices are at risk,...

Mobile Account Hijacking: A New Identity Theft Threat

Mobile Account Hijacking: A New Identity Theft Threat


Posted June 28, 2016 in Compliance, Data Breach, Malware

Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...

Intel Admits Its Antivirus Software Is Useless

Intel Admits Its Antivirus Software Is Useless


Posted June 28, 2016 in Ransomware, Malware, Data Breach

Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...

Cyber Ransom Insurance: Does Your Business Need It?

Cyber Ransom Insurance: Does Your Business Need It?


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...

Invisible ATM Skimmers: How to Protect Your Cards

Invisible ATM Skimmers: How to Protect Your Cards


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...

Ransomware Costs Are Skyrocketing: What to Know

Ransomware Costs Are Skyrocketing: What to Know


Posted June 9, 2016 in Ransomware, Cryptocurrency, Bitcoin, Malware, Data Breach

Ransomware demands have increased dramatically as attacks surge worldwide. Learn why costs keep rising and how to...

Russia Arrests 50 Hackers in Largest-Ever Crackdown

Russia Arrests 50 Hackers in Largest-Ever Crackdown


Posted June 6, 2016 in Malware, Work from Home, Data Breach

Russia executes its largest hacker arrest in history, rounding up 50 cybercriminals. See what this unprecedented...