5 Concerns of Healthcare Executives
Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach
According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical...
Say Goodbye to Two-Factor Authentication Texts
Posted July 26, 2016 in Data Breach, Malware, Cloud Security
If you've been using two-factor authentication, you're very used to online services sending you a code via text to...
Is Trump to Blame for the Recent DNC Leaks?
Posted July 26, 2016 in Data Breach, Digital Forensics, Cloud Security
As our recent blog stated, almost 20,000 DNC emails were posted by WikiLeaks on Friday, and it was believed to have...
Leaked DNC Email Thumbs Nose at Article Questioning DNC Cybersecurity
Posted July 25, 2016 in Malware, Data Breach, Compliance
What is the definition of irony? Writing an email that mocks a news report, questioning your cybersecurity, just two...
Snowden Unveils Device to Help Keep Phone Secure
Posted July 23, 2016 in Data Breach, AI, Malware
Now that Lindsay Mills has reunited with her exiled boyfriend, Edward Snowden, in Russia, the NSA whistleblower...
Offline Locky
Posted July 22, 2016 in Ransomware, Malware, Cloud Security
You may have heard about the Locky strain of ransomware due to it being one of the most pervasive brands of malware....
Police 3D Print Fingerprint to Unlock Phone
Posted July 22, 2016 in Data Breach, Digital Forensics, Malware
We all remember the dispute Apple and the FBI had over unlocking the phone of one of the shooters in the San...
Fake Wifi Networks at the RNC
Posted July 22, 2016 in Data Breach, Malware, Cloud Security
By now people should know not to jump on untrusted Wi-Fi networks, but unfortunately there are a lot of people who...