Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Technology

Law Firms: Is Your Client Data Really Secure?

Law Firms: Is Your Client Data Really Secure?


Posted October 6, 2016 in Malware, Data Breach, Compliance

Legal practices handle sensitive financial and personal data daily. Discover the cybersecurity gaps putting your...

Second NSA Whistleblower Arrested: Snowden Part II

Second NSA Whistleblower Arrested: Snowden Part II


Posted October 6, 2016 in Data Breach, Digital Forensics, Malware

A second NSA contractor was arrested for stealing classified hacking tools, echoing the Snowden case. See what was...

68 Million Dropbox Accounts Leaked: Free Download

68 Million Dropbox Accounts Leaked: Free Download


Posted October 5, 2016 in Data Breach, Malware, Cloud Security

Hackers dumped 68 million Dropbox credentials online for free after initially selling them. Check if your account was...

Body-Based Password Transmission: The Future of Auth

Body-Based Password Transmission: The Future of Auth


Posted October 4, 2016 in Data Breach, Malware, Cloud Security

Scientists developed a way to send passwords through your body instead of Wi-Fi, making interception nearly...

Fake Accounts Scandal: Wells Fargo Not Alone

Fake Accounts Scandal: Wells Fargo Not Alone


Posted October 3, 2016 in Data Breach, Malware, Cloud Security

After Wells Fargo's millions of fake accounts, evidence suggests other banks may have similar practices. Find out...

Massive Yahoo Hack: Change Your Password Now

Massive Yahoo Hack: Change Your Password Now


Posted September 22, 2016 in Compliance, Data Breach, Malware

Yahoo confirmed a massive data breach affecting hundreds of millions of accounts. If you have not changed your...

September 2016 Cybersecurity Threat Report Highlights

September 2016 Cybersecurity Threat Report Highlights


Posted September 20, 2016 in Ransomware, Malware, Data Breach

McAfee Labs reports ransomware, mobile malware, and macro threats all surged in September 2016. Review the key stats...

Periscope ATM Skimmer: Secret Service Warning

Periscope ATM Skimmer: Secret Service Warning


Posted September 14, 2016 in Malware, Data Breach, Compliance

The Secret Service warns banks about Periscope, a new ATM skimmer installed inside machines and nearly impossible to...

DIY Ransomware Kits: Build Your Own Cyber Weapon

DIY Ransomware Kits: Build Your Own Cyber Weapon


Posted September 12, 2016 in Ransomware, Malware, Data Breach

Ransomware-as-a-service lets anyone create custom ransomware with zero coding skills. See how these dangerous kits...

Acoustic Hacking: Stealing Data with Sound Waves

Acoustic Hacking: Stealing Data with Sound Waves


Posted September 8, 2016 in Malware, Data Breach, Cloud Security

Researchers proved hackers can use sound waves to extract data from air-gapped computers. Explore this fascinating...

68 Million Dropbox Accounts Leaked: What to Do Now

68 Million Dropbox Accounts Leaked: What to Do Now


Posted August 31, 2016 in Data Breach, Malware, Compliance

The 2012 Dropbox hack was far worse than reported, with 68 million accounts compromised. Learn if you were affected...

iPhone Spyware: Malware Records Calls and Texts

iPhone Spyware: Malware Records Calls and Texts


Posted August 29, 2016 in Malware, Data Breach, AI

Powerful new iPhone malware built by NSO Group lets governments spy on calls, texts, and location. Find out if your...