Cybersecurity Blog


Subscribe
Fake Font Update Installs Virus on Chrome Users

Fake Font Update Installs Virus on Chrome Users


Posted March 1, 2017 in Ransomware, Malware, Data Breach

A clever scam tricks Chrome users into installing malware disguised as a missing font update. Learn how this social...

EU Regulations Coming to US: Is Your Business Ready?

EU Regulations Coming to US: Is Your Business Ready?


Posted February 27, 2017 in Compliance, Data Breach, HIPAA

European data protection regulations are reshaping US business compliance requirements. Learn what GDPR-style rules...

Turn Employees Into Cybersecurity Assets, Not Risks

Turn Employees Into Cybersecurity Assets, Not Risks


Posted February 24, 2017 in Ransomware, Malware, HIPAA, Data Breach

Employee mistakes are the top cause of data breaches. Learn how to transform your workforce from a cybersecurity...

Deadly Ransomware Targets Small Businesses

Deadly Ransomware Targets Small Businesses


Posted February 24, 2017 in Ransomware, Malware, Data Breach

Ransomware is devastating small businesses and healthcare organizations with crippling attacks. Learn the 5 critical...

Craig Petronella on The Sales Podcast: 20x Your Fees

Craig Petronella on The Sales Podcast: 20x Your Fees


Posted February 22, 2017 in Data Breach, Compliance, AI

Craig Petronella shares how to 20x your fees, set proper sales goals, and define your cybersecurity niche on The...

Hackers Lure Israeli Soldiers via Fake Profiles

Hackers Lure Israeli Soldiers via Fake Profiles


Posted February 21, 2017 in Malware, Data Breach, Cloud Security

State-sponsored hackers created fake social media profiles to target Israeli soldiers and steal military intelligence.

Microsoft Vulnerability Left Unpatched for Months

Microsoft Vulnerability Left Unpatched for Months


Posted February 21, 2017 in Data Breach, Malware, Compliance

Google's Project Zero exposed a critical Microsoft vulnerability after Microsoft failed to patch it. Learn why...

Trump Campaign Website Hacked: What Happened

Trump Campaign Website Hacked: What Happened


Posted February 20, 2017 in Data Breach, Malware, Cloud Security

An official Trump campaign fundraising website was compromised by hackers. Learn what was exposed and why political...

Work Email Is More Dangerous Than Personal Email

Work Email Is More Dangerous Than Personal Email


Posted February 20, 2017 in Malware, Data Breach, Cryptocurrency

Analysis of 1 billion+ emails reveals work email carries far more threats than personal accounts. Discover why...

Why Hackers Always Have the Upper Hand

Why Hackers Always Have the Upper Hand


Posted February 20, 2017 in Ransomware, Data Breach, Cloud Security

No matter your defenses, hackers start with an advantage. Backups, firewalls, and insurance are not enough. Discover...

Yahoo Hack Bypasses Passwords Using Forged Cookies

Yahoo Hack Bypasses Passwords Using Forged Cookies


Posted February 16, 2017 in Data Breach, Digital Forensics, Malware

Hackers breached Yahoo accounts without passwords by forging authentication cookies. Learn how this attack bypassed...

How Smart Home Devices Help Hackers Attack You

How Smart Home Devices Help Hackers Attack You


Posted February 16, 2017 in HIPAA, Data Breach, Cloud Security

Your new smart home gadgets could be a hacker's best friend. Learn how IoT devices from Amazon Echo to smart TVs...