Cybersecurity Blog


Subscribe

Posts tagged: Cloud Security

Category: Cybersecurity

Aetna Healthcare Cybersecurity: Breach Defense

Aetna Healthcare Cybersecurity: Breach Defense


Posted October 13, 2016 in HIPAA, Data Breach, Cloud Security

Aetna uses analytics to scan data dumps and protect employee credentials proactively. Learn their innovative approach...

Turkey Censors Google, Microsoft Cloud Services

Turkey Censors Google, Microsoft Cloud Services


Posted October 10, 2016 in Data Breach, Compliance, Cloud Security

Turkey blocked access to Google Drive, Microsoft OneDrive, Dropbox, and GitHub. Learn why authoritarian censorship of...

US Formally Accuses Russia of Election Cyberattacks

US Formally Accuses Russia of Election Cyberattacks


Posted October 8, 2016 in Data Breach, Cloud Security, Blockchain

The Obama administration officially blamed Russia for cyberattacks targeting the US election. See the evidence...

How to Protect Your Router from Hackers: A Guide

How to Protect Your Router from Hackers: A Guide


Posted October 8, 2016 in Malware, Data Breach, Cloud Security

Your router is the gateway to your entire home network. Follow this step-by-step guide to secure your router and...

6,700 Health Workers Data Left Vulnerable

6,700 Health Workers Data Left Vulnerable


Posted October 8, 2016 in Data Breach, Malware, Cloud Security

A potential breach at the Health and Human Services Department exposed data on 6,700 federal health workers. Learn...

68 Million Dropbox Accounts Leaked: Free Download

68 Million Dropbox Accounts Leaked: Free Download


Posted October 5, 2016 in Data Breach, Malware, Cloud Security

Hackers dumped 68 million Dropbox credentials online for free after initially selling them. Check if your account was...

Body-Based Password Transmission: The Future of Auth

Body-Based Password Transmission: The Future of Auth


Posted October 4, 2016 in Data Breach, Malware, Cloud Security

Scientists developed a way to send passwords through your body instead of Wi-Fi, making interception nearly...

Fake Accounts Scandal: Wells Fargo Not Alone

Fake Accounts Scandal: Wells Fargo Not Alone


Posted October 3, 2016 in Data Breach, Malware, Cloud Security

After Wells Fargo's millions of fake accounts, evidence suggests other banks may have similar practices. Find out...

Trump Hotels Credit Card Breach Coverup Exposed

Trump Hotels Credit Card Breach Coverup Exposed


Posted September 26, 2016 in Data Breach, Compliance, Cloud Security

Trump Hotel Collection suffered a data breach but delayed notifying victims for months. Learn what was stolen and why...

Acoustic Hacking: Stealing Data with Sound Waves

Acoustic Hacking: Stealing Data with Sound Waves


Posted September 8, 2016 in Malware, Data Breach, Cloud Security

Researchers proved hackers can use sound waves to extract data from air-gapped computers. Explore this fascinating...

Hillary Clinton Lost Laptop: Email Archives Missing

Hillary Clinton Lost Laptop: Email Archives Missing


Posted September 6, 2016 in AI, Cloud Security, Data Breach

Archives of Clinton's emails on a laptop and thumb drive went missing after being shipped. Learn how this security...

75% of Data Breaches Are Easily Preventable: Here's How

75% of Data Breaches Are Easily Preventable: Here's How


Posted August 18, 2016 in Malware, Data Breach, Cloud Security

Over 75% of data breaches in 2015 were caused by stolen or weak credentials. Learn the simple steps that prevent most...