Cybersecurity Blog


Subscribe
Ransomware on Mobile: Your Phone Is Not Safe

Ransomware on Mobile: Your Phone Is Not Safe


Posted June 30, 2016 in Ransomware, Malware, Data Breach

Ransomware has spread from computers to smartphones. Learn how mobile ransomware works, which devices are at risk,...

Mass General Hospital Breach: 4,300 Records Hacked

Mass General Hospital Breach: 4,300 Records Hacked


Posted June 30, 2016 in Data Breach, Digital Forensics, Malware

Massachusetts General Hospital confirms 4,300 medical records were compromised in a data breach. See the impact and...

7 Tips to Avoid Being a Data Breach Victim

7 Tips to Avoid Being a Data Breach Victim


Posted June 29, 2016 in Data Breach, HIPAA, Malware

Data breaches have exposed millions of patient records. Follow these seven essential tips from Petronella to protect...

Mobile Account Hijacking: A New Identity Theft Threat

Mobile Account Hijacking: A New Identity Theft Threat


Posted June 28, 2016 in Compliance, Data Breach, Malware

Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...

Intel Admits Its Antivirus Software Is Useless

Intel Admits Its Antivirus Software Is Useless


Posted June 28, 2016 in Ransomware, Malware, Data Breach

Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...

Why Healthcare Is the #1 Cyber Attack Target

Why Healthcare Is the #1 Cyber Attack Target


Posted June 24, 2016 in Ransomware, HIPAA, Data Breach

Hospitals and medical practices are the top targets for cybercriminals. Discover why healthcare data is so valuable...

Cyber Ransom Insurance: Does Your Business Need It?

Cyber Ransom Insurance: Does Your Business Need It?


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...

Invisible ATM Skimmers: How to Protect Your Cards

Invisible ATM Skimmers: How to Protect Your Cards


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...

HIPAA Rules After a Tragedy: Common Misconceptions

HIPAA Rules After a Tragedy: Common Misconceptions


Posted June 16, 2016 in HIPAA, Compliance, NIST

The Orlando tragedy raised questions about HIPAA and patient information sharing. Learn the common misconceptions...

Pentagon Bug Bounty Reveals 100+ Vulnerabilities

Pentagon Bug Bounty Reveals 100+ Vulnerabilities


Posted June 15, 2016 in Penetration Testing, Data Breach, Malware

1,400 hackers found over 100 weaknesses in Pentagon networks through a sanctioned bug bounty program. See what they...

NSA Exploited MS Word Macros for Surveillance

NSA Exploited MS Word Macros for Surveillance


Posted June 13, 2016 in Compliance, Ransomware, Malware, Data Breach

Snowden emails reveal how the NSA weaponized Microsoft Word macros for spying. Discover the government surveillance...

Ransomware Costs Are Skyrocketing: What to Know

Ransomware Costs Are Skyrocketing: What to Know


Posted June 9, 2016 in Ransomware, Cryptocurrency, Bitcoin, Malware, Data Breach

Ransomware demands have increased dramatically as attacks surge worldwide. Learn why costs keep rising and how to...