Subscribe

Seven Tips to Avoid Being Victimized by a Data Breach


Posted June 29, 2016 in Data Breach, HIPAA, Malware

At the time of this writing, one hacker claims to have stolen information from three healthcare databases totaling up...

Mobile Phone Account Hijacking


Posted June 28, 2016 in Compliance, Data Breach, Malware

By hijacking mobile phone accounts, identity thieves have found a new and easy way to make money. This new technique...

Intel CEO Acknowledges Uselessness of its Antivirus


Posted June 28, 2016 in Ransomware, Malware, Data Breach

If at first you don’t succeed, try, try again, right? Sometimes, the answer is just no, as is the case with Intel...

Healthcare Industry is the Ultimate Cyber Attack Target


Posted June 24, 2016 in Ransomware, HIPAA, Data Breach

If you have been following this blog, you know that hospitals have become a major target of cybercriminals this year....

Cyber Ransom Liability Insurance


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

As our blog's history shows, the healthcare industry has become an increasingly popular ransomware target for...

Invisible ATM Skimmers


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

It was recently reported that credit card skimmers were being found at Walmart stores. Now we have video of skimmers...

HIPAA Misunderstandings in the Wake of Orlando Tragedy


Posted June 16, 2016 in HIPAA, Compliance, NIST

With the tragic events that unfolded in Orlando at the Pulse nightclub, a lot of questions about LGBT safety, gun...

Hackers Find Scores of Pentagon Vulnerabilities


Posted June 15, 2016 in Penetration Testing, Data Breach, Malware

Over 100 weaknesses have been found in the Pentagon's networks and websites.  Fortunately, these hackers were paid to...