Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Ransomware Uses Extortion-Style Tactics

Ransomware Uses Extortion-Style Tactics


Posted January 12, 2017 in Ransomware, Malware, Data Breach

New ransomware variants mimic classic extortion schemes, demanding payment to unlock your files. Discover proven...

Russian Malware Found in Vermont Utility

Russian Malware Found in Vermont Utility


Posted January 10, 2017 in Malware, Data Breach, Cloud Security

Malware linked to Russian cyberattacks was discovered on a Vermont utility laptop. Learn how investigators trace...

Watering Hole Attacks: How Hackers Target You

Watering Hole Attacks: How Hackers Target You


Posted December 29, 2016 in Malware, Data Breach, Cloud Security

Watering hole attacks compromise trusted websites to infect visitors. Discover how these stealthy cyberattacks work...

How Security Standards Eliminate Human Error

How Security Standards Eliminate Human Error


Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware

Industry security standards reduce costly human errors that lead to data breaches. Learn which frameworks protect...

Real-World Spyware: Beyond the Stereotypical Hacker

Real-World Spyware: Beyond the Stereotypical Hacker


Posted December 29, 2016 in Compliance, Malware, Data Breach

Spyware operators are not basement-dwelling stereotypes but sophisticated real-world operatives. Discover how modern...

Chinese Hackers Steal $4M from US Law Firms

Chinese Hackers Steal $4M from US Law Firms


Posted December 28, 2016 in Malware, Data Breach, Compliance

Three Chinese hackers made $4 million by hacking US law firms for insider trading intelligence. See how cyber...

Ukraine Cyberwarfare: Real-World Impact of Digital Attacks

Ukraine Cyberwarfare: Real-World Impact of Digital Attacks


Posted December 28, 2016 in Malware, Data Breach, Compliance

When cyberwarfare hits, real people suffer beyond just lost data and infected devices. See how Ukraine's cyber...

Best Cybersecurity Development for Hospitals in 2016

Best Cybersecurity Development for Hospitals in 2016


Posted December 28, 2016 in NIST, Ransomware, Malware, Data Breach

Despite a rough year for healthcare security, one major development gave hospitals better protection. Learn what...

FERPA Explained: Student Data Privacy Laws You Must Know

FERPA Explained: Student Data Privacy Laws You Must Know


Posted December 27, 2016 in HIPAA, Compliance, Malware

The University of Minnesota boycott exposed how student privacy laws like FERPA affect everyone. Understand the...

2016 Hacking Trends Every Business Should Know

2016 Hacking Trends Every Business Should Know


Posted December 27, 2016 in HIPAA, Ransomware, Malware, Data Breach

From ransomware surges to nation-state attacks, 2016 saw major shifts in cybercrime. Review the top hacking trends...

Healthcare Cyberattacks Doubled in 2016: Full Report

Healthcare Cyberattacks Doubled in 2016: Full Report


Posted December 26, 2016 in HIPAA, Ransomware, Malware, Data Breach

Healthcare cyberattacks surged in 2016 with major breaches nearly doubling. See the full breakdown and what medical...

Driverless Car Malware: Hacking Autonomous Vehicle Systems

Driverless Car Malware: Hacking Autonomous Vehicle Systems


Posted December 26, 2016 in Malware, Data Breach, Cloud Security

Malware targeting driverless cars could turn exciting technology into a deadly weapon. Learn how hackers threaten...