Cybersecurity Blog


Subscribe
Security Analyst Careers: High Demand, Top Salaries

Security Analyst Careers: High Demand, Top Salaries


Posted July 26, 2016 in Ransomware, HIPAA, Data Breach

Information security analyst jobs are booming due to rising cyber threats. Explore career opportunities, salary data,...

5 Critical Cybersecurity Gaps in Healthcare

5 Critical Cybersecurity Gaps in Healthcare


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

A two-year study reveals healthcare organizations are dangerously unprepared for cyberattacks. See the top 5 concerns...

Why SMS Two-Factor Authentication Is No Longer Safe

Why SMS Two-Factor Authentication Is No Longer Safe


Posted July 26, 2016 in Data Breach, Malware, Cloud Security

Text-based two-factor authentication is being phased out due to security risks. Learn why SMS codes are vulnerable...

DNC Email Hack: Russian Hackers Behind the Breach?

DNC Email Hack: Russian Hackers Behind the Breach?


Posted July 26, 2016 in Data Breach, Digital Forensics, Cloud Security

Nearly 20,000 DNC emails leaked by WikiLeaks, with Russian hackers suspected. Analyze the evidence and understand the...

DNC Email Leak Exposes Cybersecurity Hypocrisy

DNC Email Leak Exposes Cybersecurity Hypocrisy


Posted July 25, 2016 in Malware, Data Breach, Compliance

DNC staffers mocked a cybersecurity warning just months before their system was hacked. See the ironic emails exposed...

Snowden Designs Anti-Surveillance Phone Device

Snowden Designs Anti-Surveillance Phone Device


Posted July 23, 2016 in Data Breach, AI, Malware

Edward Snowden unveils a hardware device designed to detect phone surveillance. Learn how this anti-spying technology...

Locky Ransomware Now Works Offline: What to Know

Locky Ransomware Now Works Offline: What to Know


Posted July 22, 2016 in Ransomware, Malware, Cloud Security

The Locky ransomware strain now encrypts files without an internet connection. This dangerous evolution makes it...

Police Use 3D-Printed Fingerprint to Unlock Phone

Police Use 3D-Printed Fingerprint to Unlock Phone


Posted July 22, 2016 in Data Breach, Digital Forensics, Malware

Law enforcement 3D-printed a fingerprint to unlock a murder victim's phone. This breakthrough raises serious...

Fake WiFi Networks Exposed at the RNC Convention

Fake WiFi Networks Exposed at the RNC Convention


Posted July 22, 2016 in Data Breach, Malware, Cloud Security

Security researchers set up fake WiFi networks at the Republican National Convention to test attendees. The results...

OHSU Pays $2.7 Million HIPAA Fine: Key Takeaways

OHSU Pays $2.7 Million HIPAA Fine: Key Takeaways


Posted July 20, 2016 in HIPAA, Compliance, Data Breach

Oregon Health and Science University paid $2.7M for two HIPAA breaches. Learn what violations triggered the fine and...

Critical iPhone Update Stops Silent Spyware Attacks

Critical iPhone Update Stops Silent Spyware Attacks


Posted July 20, 2016 in Data Breach, Malware, Cloud Security

A critical iPhone vulnerability allows silent spyware installation. Update your device immediately to block this...

Pokemon Go Scams: Hackers Exploit Gamers Worldwide

Pokemon Go Scams: Hackers Exploit Gamers Worldwide


Posted July 19, 2016 in Malware, Data Breach, Compliance

Cybercriminals exploit Pokemon Go players with phishing scams and fake apps. Learn how to spot these scams and keep...