Biometrics: Convenience or Risk?
Posted July 28, 2016 in Data Breach, Malware, Cloud Security
When Apple first came out with its Touch ID on the iPhone 5, it was like owning a piece of the future. The popularity...
Every Windows Password Can be Cracked Within Six Hours
Posted July 27, 2016 in Malware, AI, Cloud Security
A password cracking specialist has built a beast of a computer that has the ability to attempt upwards of 350 billion...
Stolen Passwords from Wireless Keyboards
Posted July 27, 2016 in Data Breach, AI, Cloud Security
If you are using a cheap wireless keyboard, you run the risk of having your passwords stolen. According to...
LastPass Vulnerability Could Give Hackers All Your Passwords
Posted July 27, 2016 in Malware, Data Breach, Cloud Security
Millions of people use LastPass to store passwords for all their various accounts. It's a great idea, because it can...
Innocent Bystanders of DNC WikiLeak
Posted July 26, 2016 in Data Breach, Compliance, Cloud Security
WikiLeaks’ crusade of radical transparency is in some respects a noble one, but there are occasions when innocent...
Electronic Health Record Outages
Posted July 26, 2016 in HIPAA, Ransomware, NIST, Data Breach
According to the Health and Human Services Office for the Inspector General (OIG), in 2014 almost 60% of hospitals...
Security Analyst Jobs
Posted July 26, 2016 in Ransomware, HIPAA, Data Breach
As a result of the rash of hacking, ransomware and data breaches in recent years, information security professionals...
5 Concerns of Healthcare Executives
Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach
According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical...