Cybersecurity Blog
Category: Cybersecurity
Satana Malware: Two Viruses Combined Into One
Posted July 14, 2016 in Ransomware, Malware, Data Breach
Satana malware merges two aggressive ransomware strains into one devastating threat. Understand this dangerous hybrid...
Amazon Server Breach Exposes 80,000 User Accounts
Posted July 11, 2016 in Penetration Testing, Data Breach, Cloud Security
A hacker released 80,000 Amazon usernames and passwords after Amazon ignored vulnerability warnings. See what...
YouTube Videos Can Actually Hack Your Smartphone
Posted July 11, 2016 in Data Breach, Digital Forensics, Malware
University researchers prove YouTube videos can be weaponized to hack smartphones and steal personal data. Learn how...
Congress Declares War on Ransomware Attacks
Posted July 6, 2016 in Ransomware, Data Breach, Malware, HIPAA
Bipartisan legislation targets the growing ransomware epidemic. Learn what Congress is doing to fight back and how it...
Fake Software Site Steals Government Credentials
Posted July 6, 2016 in Malware, Data Breach, Cloud Security
A seemingly legitimate software website secretly harvested government login credentials via keyloggers. Learn the...
Ransomware on Mobile: Your Phone Is Not Safe
Posted June 30, 2016 in Ransomware, Malware, Data Breach
Ransomware has spread from computers to smartphones. Learn how mobile ransomware works, which devices are at risk,...
Mobile Account Hijacking: A New Identity Theft Threat
Posted June 28, 2016 in Compliance, Data Breach, Malware
Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...
Intel Admits Its Antivirus Software Is Useless
Posted June 28, 2016 in Ransomware, Malware, Data Breach
Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...
Cyber Ransom Insurance: Does Your Business Need It?
Posted June 21, 2016 in Ransomware, HIPAA, Compliance
With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...
Invisible ATM Skimmers: How to Protect Your Cards
Posted June 16, 2016 in Data Breach, Malware, Cloud Security
New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...
Ransomware Costs Are Skyrocketing: What to Know
Posted June 9, 2016 in Ransomware, Cryptocurrency, Bitcoin, Malware, Data Breach
Ransomware demands have increased dramatically as attacks surge worldwide. Learn why costs keep rising and how to...
Russia Arrests 50 Hackers in Largest-Ever Crackdown
Posted June 6, 2016 in Malware, Work from Home, Data Breach
Russia executes its largest hacker arrest in history, rounding up 50 cybercriminals. See what this unprecedented...