Cybersecurity Blog


Subscribe

Category: Cybersecurity

Russian Hack Goes Deeper Than DNC: Full Scope Revealed

Russian Hack Goes Deeper Than DNC: Full Scope Revealed


Posted October 10, 2016 in Malware, Data Breach, Digital Forensics

The Russian cyberattack extended far beyond the DNC into broader US political infrastructure. Discover the full...

US Formally Accuses Russia of Election Cyberattacks

US Formally Accuses Russia of Election Cyberattacks


Posted October 8, 2016 in Data Breach, Cloud Security, Blockchain

The Obama administration officially blamed Russia for cyberattacks targeting the US election. See the evidence...

6,700 Health Workers Data Left Vulnerable

6,700 Health Workers Data Left Vulnerable


Posted October 8, 2016 in Data Breach, Malware, Cloud Security

A potential breach at the Health and Human Services Department exposed data on 6,700 federal health workers. Learn...

Law Firms: Is Your Client Data Really Secure?

Law Firms: Is Your Client Data Really Secure?


Posted October 6, 2016 in Malware, Data Breach, Compliance

Legal practices handle sensitive financial and personal data daily. Discover the cybersecurity gaps putting your...

68 Million Dropbox Accounts Leaked: Free Download

68 Million Dropbox Accounts Leaked: Free Download


Posted October 5, 2016 in Data Breach, Malware, Cloud Security

Hackers dumped 68 million Dropbox credentials online for free after initially selling them. Check if your account was...

Body-Based Password Transmission: The Future of Auth

Body-Based Password Transmission: The Future of Auth


Posted October 4, 2016 in Data Breach, Malware, Cloud Security

Scientists developed a way to send passwords through your body instead of Wi-Fi, making interception nearly...

Fake Accounts Scandal: Wells Fargo Not Alone

Fake Accounts Scandal: Wells Fargo Not Alone


Posted October 3, 2016 in Data Breach, Malware, Cloud Security

After Wells Fargo's millions of fake accounts, evidence suggests other banks may have similar practices. Find out...

Trump Hotels Credit Card Breach Coverup Exposed

Trump Hotels Credit Card Breach Coverup Exposed


Posted September 26, 2016 in Data Breach, Compliance, Cloud Security

Trump Hotel Collection suffered a data breach but delayed notifying victims for months. Learn what was stolen and why...

State of Cybersecurity: Why the Good Guys Are Losing

State of Cybersecurity: Why the Good Guys Are Losing


Posted September 22, 2016 in Ransomware, Data Breach, HIPAA

Despite $3 billion in startup funding, cybersecurity defenses are failing against sophisticated attackers. Discover...

September 2016 Cybersecurity Threat Report Highlights

September 2016 Cybersecurity Threat Report Highlights


Posted September 20, 2016 in Ransomware, Malware, Data Breach

McAfee Labs reports ransomware, mobile malware, and macro threats all surged in September 2016. Review the key stats...

DIY Ransomware Kits: Build Your Own Cyber Weapon

DIY Ransomware Kits: Build Your Own Cyber Weapon


Posted September 12, 2016 in Ransomware, Malware, Data Breach

Ransomware-as-a-service lets anyone create custom ransomware with zero coding skills. See how these dangerous kits...

Acoustic Hacking: Stealing Data with Sound Waves

Acoustic Hacking: Stealing Data with Sound Waves


Posted September 8, 2016 in Malware, Data Breach, Cloud Security

Researchers proved hackers can use sound waves to extract data from air-gapped computers. Explore this fascinating...