Hacktivism Explained: Ethics of Vigilante Hacking
Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach
The Popcorn Time ransomware let victims unlock files by infecting others. Explore the murky ethics of hacktivism and...
Ransomware Found on Google Play Store
Posted January 25, 2017 in Ransomware, Malware, Data Breach
A ransomware app bypassed Google Play security and infected Android devices. Discover how malicious apps slip through...
Charter Spectrum's Dangerous WiFi Security Advice
Posted January 25, 2017 in Data Breach, Malware, Cloud Security
Charter Spectrum told customers to share WiFi passwords for sports loyalty. Learn why this terrible security advice...
200,000 Servers Still Vulnerable to Heartbleed
Posted January 23, 2017 in Malware, Data Breach, Cloud Security
Nearly 200,000 servers remain exposed to the Heartbleed vulnerability years after discovery. Find out if your systems...
Gmail Phishing Scam Fools Security Experts
Posted January 19, 2017 in Malware, Data Breach, Compliance
A sophisticated Gmail phishing scam is tricking even cybersecurity professionals. Learn how to spot the warning signs...
Student Faces 10 Years for Keylogger Attack
Posted January 16, 2017 in Cryptocurrency, Bitcoin, Malware, Data Breach
A college student used keylogger malware to steal credentials and change grades. Learn how this cyberattack unfolded...
US Special Ops Health Data Breach Exposed
Posted January 13, 2017 in Data Breach, HIPAA, Digital Forensics
Eleven gigabytes of SOCOM health data were exposed online due to a critical vulnerability. Learn how this military...
Ransomware Uses Extortion-Style Tactics
Posted January 12, 2017 in Ransomware, Malware, Data Breach
New ransomware variants mimic classic extortion schemes, demanding payment to unlock your files. Discover proven...