Subscribe

Biometrics: Convenience or Risk?


Posted July 28, 2016 in Data Breach, Malware, Cloud Security

When Apple first came out with its Touch ID on the iPhone 5, it was like owning a piece of the future. The popularity...

Every Windows Password Can be Cracked Within Six Hours


Posted July 27, 2016 in Malware, AI, Cloud Security

A password cracking specialist has built a beast of a computer that has the ability to attempt upwards of 350 billion...

Stolen Passwords from Wireless Keyboards


Posted July 27, 2016 in Data Breach, AI, Cloud Security

If you are using a cheap wireless keyboard, you run the risk of having your passwords stolen. According to...

LastPass Vulnerability Could Give Hackers All Your Passwords


Posted July 27, 2016 in Malware, Data Breach, Cloud Security

Millions of people use LastPass to store passwords for all their various accounts.  It's a great idea, because it can...

Innocent Bystanders of DNC WikiLeak


Posted July 26, 2016 in Data Breach, Compliance, Cloud Security

WikiLeaks’ crusade of radical transparency is in some respects a noble one, but there are occasions when innocent...

Electronic Health Record Outages


Posted July 26, 2016 in HIPAA, Ransomware, NIST, Data Breach

According to the Health and Human Services Office for the Inspector General (OIG), in 2014 almost 60% of hospitals...

Security Analyst Jobs


Posted July 26, 2016 in Ransomware, HIPAA, Data Breach

As a result of the rash of hacking, ransomware and data breaches in recent years, information security professionals...

5 Concerns of Healthcare Executives


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical...