Subscribe

5 Concerns of Healthcare Executives


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical...

Say Goodbye to Two-Factor Authentication Texts


Posted July 26, 2016 in Data Breach, Malware, Cloud Security

If you've been using two-factor authentication, you're very used to online services sending you a code via text to...

Is Trump to Blame for the Recent DNC Leaks?


Posted July 26, 2016 in Data Breach, Digital Forensics, Cloud Security

As our recent blog stated, almost 20,000 DNC emails were posted by WikiLeaks on Friday, and it was believed to have...

Leaked DNC Email Thumbs Nose at Article Questioning DNC Cybersecurity


Posted July 25, 2016 in Malware, Data Breach, Compliance

What is the definition of irony? Writing an email that mocks a news report, questioning your cybersecurity, just two...

Snowden Unveils Device to Help Keep Phone Secure


Posted July 23, 2016 in Data Breach, AI, Malware

Now that Lindsay Mills has reunited with her exiled boyfriend, Edward Snowden, in Russia, the NSA whistleblower...

Offline Locky


Posted July 22, 2016 in Ransomware, Malware, Cloud Security

You may have heard about the Locky strain of ransomware due to it being one of the most pervasive brands of malware....

Police 3D Print Fingerprint to Unlock Phone


Posted July 22, 2016 in Data Breach, Digital Forensics, Malware

We all remember the dispute Apple and the FBI had over unlocking the phone of one of the shooters in the San...

Fake Wifi Networks at the RNC


Posted July 22, 2016 in Data Breach, Malware, Cloud Security

By now people should know not to jump on untrusted Wi-Fi networks, but unfortunately there are a lot of people who...