Cybersecurity Blog


Subscribe

Category: Technology

Android Ransomware Filecoder.C: What You Must Know

Android Ransomware Filecoder.C: What You Must Know


Posted July 30, 2019 in Ransomware, Cryptocurrency, Bitcoin, Data Breach

ESET researchers discovered Android/Filecoder.C ransomware spreading through SMS. Learn how it works and how to...

First UPS Drone Delivery Launches in North Carolina

First UPS Drone Delivery Launches in North Carolina


Posted March 26, 2019 in AI, Cloud Security, Data Breach

North Carolina makes history again with the first-ever FAA-approved commercial UPS drone delivery. See how drone...

Autonomous Delivery Robots Launch at George Mason

Autonomous Delivery Robots Launch at George Mason


Posted January 24, 2019 in AI, Cloud Security, Data Breach

George Mason University deploys Starship Technologies' autonomous robots for campus food delivery. See how this...

DarthMiner Malware Targets Mac Users via Adobe

DarthMiner Malware Targets Mac Users via Adobe


Posted December 11, 2018 in Malware, Data Breach, Cloud Security

DarthMiner combines multiple threats to attack Mac systems through Adobe software. Learn how this dangerous malware...

Mac Users Face Rising Ransomware Threats

Mac Users Face Rising Ransomware Threats


Posted November 15, 2018 in Ransomware, Malware, Data Breach

Apple systems are no longer immune to ransomware. A new study shows Mac-targeted attacks are surging. Learn how to...

Implanted Microchips: The Future of Digital Identity

Implanted Microchips: The Future of Digital Identity


Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach

Thousands of people in Sweden have implanted NFC microchips for payments and ID. Explore the security and privacy...

Smart Home Hijacking: Secure Your IoT Devices

Smart Home Hijacking: Secure Your IoT Devices


Posted September 6, 2018 in Malware, Data Breach, AI

Your smart home devices could give criminals a backdoor into your network. Discover how to lock down IoT devices and...

Windows Update Patches Critical Spyware Vulnerability

Windows Update Patches Critical Spyware Vulnerability


Posted September 14, 2017 in Malware, Data Breach, AI

Microsoft patched 81 vulnerabilities including critical spyware flaws that let hackers execute remote commands....

CIA Exploited iPhone Vulnerabilities Since 2008

CIA Exploited iPhone Vulnerabilities Since 2008


Posted March 30, 2017 in Malware, Data Breach, AI

WikiLeaks DarkMatter dump reveals the CIA worked with Apple since 2008 to exploit iPhone vulnerabilities. See what...

iPhone Theft Scam: Find My iPhone Exploited

iPhone Theft Scam: Find My iPhone Exploited


Posted March 23, 2017 in Malware, Data Breach, AI

Thieves found a way around Find My iPhone to victimize owners twice. Learn how this exploit works and the steps to...

Secret Service Laptop Stolen: Agency Data at Risk

Secret Service Laptop Stolen: Agency Data at Risk


Posted March 23, 2017 in Data Breach, Cloud Security, AI

A thief stole a Secret Service agent's laptop caught on surveillance. Learn what sensitive data was exposed and how...

Hackers Threaten 300 Million iPhone Users

Hackers Threaten 300 Million iPhone Users


Posted March 22, 2017 in Data Breach, AI, Cloud Security

A hacker group demands ransom from Apple, claiming access to 300 million iCloud accounts. Learn if your iPhone is at...