Cybersecurity Blog
Category: Technology
Android Ransomware Filecoder.C: What You Must Know
Posted July 30, 2019 in Ransomware, Cryptocurrency, Bitcoin, Data Breach
ESET researchers discovered Android/Filecoder.C ransomware spreading through SMS. Learn how it works and how to...
First UPS Drone Delivery Launches in North Carolina
Posted March 26, 2019 in AI, Cloud Security, Data Breach
North Carolina makes history again with the first-ever FAA-approved commercial UPS drone delivery. See how drone...
Autonomous Delivery Robots Launch at George Mason
Posted January 24, 2019 in AI, Cloud Security, Data Breach
George Mason University deploys Starship Technologies' autonomous robots for campus food delivery. See how this...
DarthMiner Malware Targets Mac Users via Adobe
Posted December 11, 2018 in Malware, Data Breach, Cloud Security
DarthMiner combines multiple threats to attack Mac systems through Adobe software. Learn how this dangerous malware...
Mac Users Face Rising Ransomware Threats
Posted November 15, 2018 in Ransomware, Malware, Data Breach
Apple systems are no longer immune to ransomware. A new study shows Mac-targeted attacks are surging. Learn how to...
Implanted Microchips: The Future of Digital Identity
Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach
Thousands of people in Sweden have implanted NFC microchips for payments and ID. Explore the security and privacy...
Smart Home Hijacking: Secure Your IoT Devices
Posted September 6, 2018 in Malware, Data Breach, AI
Your smart home devices could give criminals a backdoor into your network. Discover how to lock down IoT devices and...
Windows Update Patches Critical Spyware Vulnerability
Posted September 14, 2017 in Malware, Data Breach, AI
Microsoft patched 81 vulnerabilities including critical spyware flaws that let hackers execute remote commands....
CIA Exploited iPhone Vulnerabilities Since 2008
Posted March 30, 2017 in Malware, Data Breach, AI
WikiLeaks DarkMatter dump reveals the CIA worked with Apple since 2008 to exploit iPhone vulnerabilities. See what...
iPhone Theft Scam: Find My iPhone Exploited
Posted March 23, 2017 in Malware, Data Breach, AI
Thieves found a way around Find My iPhone to victimize owners twice. Learn how this exploit works and the steps to...
Secret Service Laptop Stolen: Agency Data at Risk
Posted March 23, 2017 in Data Breach, Cloud Security, AI
A thief stole a Secret Service agent's laptop caught on surveillance. Learn what sensitive data was exposed and how...
Hackers Threaten 300 Million iPhone Users
Posted March 22, 2017 in Data Breach, AI, Cloud Security
A hacker group demands ransom from Apple, claiming access to 300 million iCloud accounts. Learn if your iPhone is at...