Subscribe

Category: Cybersecurity

Amazon Server Hack


Posted July 11, 2016 in Penetration Testing, Data Breach, Cloud Security

When Amazon didn’t take a hacker’s warnings of vulnerabilities seriously, he released the usernames ad passwords to...

YouTube Can Hack Your Phone


Posted July 11, 2016 in Data Breach, Digital Forensics, Malware

Hackers are continuously looking for new ways to steal your personal data and sell it on the black market. Thanks to...

War on Ransomware Just Got Real


Posted July 6, 2016 in Ransomware, Data Breach, Malware, HIPAA

In the great schism that is the 2016 election year, bi-partisan participation may seem like a thing of the past, but...

"Legitimate" Website Steals Governmental Credentials


Posted July 6, 2016 in Malware, Data Breach, Cloud Security

When purchasing online software programs, it is important to do your research. Case in point? The now defunct...

Ransomware for Mobile Devices


Posted June 30, 2016 in Ransomware, Malware, Data Breach

By now, you are probably aware that ransomware started running rampant this year. No computer is safe. And now,...

Mobile Phone Account Hijacking


Posted June 28, 2016 in Compliance, Data Breach, Malware

By hijacking mobile phone accounts, identity thieves have found a new and easy way to make money. This new technique...

Intel CEO Acknowledges Uselessness of its Antivirus


Posted June 28, 2016 in Ransomware, Malware, Data Breach

If at first you don’t succeed, try, try again, right? Sometimes, the answer is just no, as is the case with Intel...

Cyber Ransom Liability Insurance


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

As our blog's history shows, the healthcare industry has become an increasingly popular ransomware target for...