Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Cybersecurity Pop Quiz: Test Your Knowledge

Cybersecurity Pop Quiz: Test Your Knowledge


Posted February 1, 2017 in Malware, Data Breach, Compliance

Think you know cybersecurity? Take our pop quiz covering key cyber activists, landmark breaches, and essential...

Tax Season Cybercrime: Protect Your Returns

Tax Season Cybercrime: Protect Your Returns


Posted February 1, 2017 in Data Breach, Malware, Cloud Security

Tax season brings a surge in cybercriminal activity targeting your refund. Learn how fraudulent tax filing works and...

Our HIPAA Book Featured in Suburban Living Magazine

Our HIPAA Book Featured in Suburban Living Magazine


Posted February 1, 2017 in HIPAA, Data Breach, Malware

Our book How HIPAA Can Crush Your Medical Practice reached 16,000 homes via Suburban Living Magazine. Essential...

CEO Fraud Strikes Kansas County and Hospital

CEO Fraud Strikes Kansas County and Hospital


Posted January 31, 2017 in Data Breach, Compliance, Malware

Two organizations fell victim to CEO fraud in a single day, losing thousands to email impersonation scams. Learn how...

IoT Security Threats: Why Smart Devices Are Risky

IoT Security Threats: Why Smart Devices Are Risky


Posted January 31, 2017 in Malware, Data Breach, Cloud Security

From smart fridges to connected cars, IoT devices create massive security gaps. Discover the biggest Internet of...

Phone Scam Alert: Hang Up If You Hear This

Phone Scam Alert: Hang Up If You Hear This


Posted January 30, 2017 in Data Breach, Malware, Digital Forensics

A dangerous phone scam records your voice saying yes to authorize fraudulent charges. Learn what to do if you receive...

Trojan Hijacks Linux Machines as Proxy Servers

Trojan Hijacks Linux Machines as Proxy Servers


Posted January 26, 2017 in Malware, Data Breach, Compliance

A new Trojan turns Linux machines into anonymous proxies for hackers to hide their identity. Learn how this malware...

Ransomware Found on Google Play Store

Ransomware Found on Google Play Store


Posted January 25, 2017 in Ransomware, Malware, Data Breach

A ransomware app bypassed Google Play security and infected Android devices. Discover how malicious apps slip through...

Charter Spectrum's Dangerous WiFi Security Advice

Charter Spectrum's Dangerous WiFi Security Advice


Posted January 25, 2017 in Data Breach, Malware, Cloud Security

Charter Spectrum told customers to share WiFi passwords for sports loyalty. Learn why this terrible security advice...

200,000 Servers Still Vulnerable to Heartbleed

200,000 Servers Still Vulnerable to Heartbleed


Posted January 23, 2017 in Malware, Data Breach, Cloud Security

Nearly 200,000 servers remain exposed to the Heartbleed vulnerability years after discovery. Find out if your systems...

Gmail Phishing Scam Fools Security Experts

Gmail Phishing Scam Fools Security Experts


Posted January 19, 2017 in Malware, Data Breach, Compliance

A sophisticated Gmail phishing scam is tricking even cybersecurity professionals. Learn how to spot the warning signs...

Student Faces 10 Years for Keylogger Attack

Student Faces 10 Years for Keylogger Attack


Posted January 16, 2017 in Cryptocurrency, Bitcoin, Malware, Data Breach

A college student used keylogger malware to steal credentials and change grades. Learn how this cyberattack unfolded...