Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

IoT Security Guide: Stop Your Devices from Joining Botnets

IoT Security Guide: Stop Your Devices from Joining Botnets


Posted October 25, 2016 in Malware, Data Breach, AI

Your smart devices could be hijacked for massive DDoS attacks without you knowing. Learn how to secure IoT devices...

Email Hacking Exposed: How Podesta and Powell Were Breached

Email Hacking Exposed: How Podesta and Powell Were Breached


Posted October 24, 2016 in Data Breach, Digital Forensics, Malware

WikiLeaks published thousands of hacked campaign emails that changed an election. Learn exactly how hackers...

Yahoo Skips Earnings Call After Massive Data Breach Crisis

Yahoo Skips Earnings Call After Massive Data Breach Crisis


Posted October 20, 2016 in Malware, Data Breach, Compliance

Yahoo took the unusual step of canceling their earnings conference call amid breach fallout. See why investors and...

5,761 Online Stores Infected with Card-Stealing Malware

5,761 Online Stores Infected with Card-Stealing Malware


Posted October 19, 2016 in Malware, Data Breach, Compliance

Over 5,700 e-commerce sites are actively running card-skimming malware right now. Find out if your favorite stores...

Nuclear Power Plant Cyberattack: Risks Exposed

Nuclear Power Plant Cyberattack: Risks Exposed


Posted October 17, 2016 in Malware, Data Breach, Compliance

Hackers targeted a nuclear power plant, raising fears of catastrophic infrastructure attacks. Learn why critical...

Yahoo Data Breach Fallout: Verizon Demands $1B Discount

Yahoo Data Breach Fallout: Verizon Demands $1B Discount


Posted October 13, 2016 in Data Breach, Malware, Compliance

Verizon sought a billion-dollar discount after Yahoo revealed massive data breaches. See how cybersecurity failures...

Mac Webcam Spyware: Why Apple Users Are Not Safe

Mac Webcam Spyware: Why Apple Users Are Not Safe


Posted October 12, 2016 in Ransomware, Malware, Data Breach

New malware secretly activates Mac webcams without triggering the indicator light. Discover why Mac users face...

ATM Hacking Scheme: Romanian Cybercriminal Steals $2 Million

ATM Hacking Scheme: Romanian Cybercriminal Steals $2 Million


Posted October 12, 2016 in Malware, Data Breach, Compliance

A Romanian hacker stole $2M from ATMs before London police caught him. See how ATM skimming attacks work and how to...

Yahoo Email Surveillance: Government Scanning Exposed

Yahoo Email Surveillance: Government Scanning Exposed


Posted October 11, 2016 in Malware, Data Breach, Compliance

Yahoo secretly built software to scan millions of user emails for US intelligence. Learn how government surveillance...

Russian Hack Goes Deeper Than DNC: Full Scope Revealed

Russian Hack Goes Deeper Than DNC: Full Scope Revealed


Posted October 10, 2016 in Malware, Data Breach, Digital Forensics

The Russian cyberattack extended far beyond the DNC into broader US political infrastructure. Discover the full...

How to Protect Your Router from Hackers: A Guide

How to Protect Your Router from Hackers: A Guide


Posted October 8, 2016 in Malware, Data Breach, Cloud Security

Your router is the gateway to your entire home network. Follow this step-by-step guide to secure your router and...

6,700 Health Workers Data Left Vulnerable

6,700 Health Workers Data Left Vulnerable


Posted October 8, 2016 in Data Breach, Malware, Cloud Security

A potential breach at the Health and Human Services Department exposed data on 6,700 federal health workers. Learn...