Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

New Scam Targets Small Businesses: Hackers Shift Focus

New Scam Targets Small Businesses: Hackers Shift Focus


Posted August 15, 2016 in Data Breach, Cloud Security, Malware

Hackers are abandoning big corporations to target small businesses with less security. Discover the latest scam...

Microsoft Encryption Backdoor Leak Proves Apple Right

Microsoft Encryption Backdoor Leak Proves Apple Right


Posted August 11, 2016 in Malware, AI, Data Breach

Microsoft accidentally leaked its Secure Boot golden key, proving encryption backdoors are inherently unsafe. See why...

Video Jacking: Phone Hacking via Screen Mirroring

Video Jacking: Phone Hacking via Screen Mirroring


Posted August 11, 2016 in Data Breach, Malware, Cloud Security

Hackers can record everything on your phone screen through a compromised charging station. Learn how video jacking...

Volkswagen Hack: Thieves Unlock Millions of Cars

Volkswagen Hack: Thieves Unlock Millions of Cars


Posted August 11, 2016 in Data Breach, Malware, Compliance

Researchers cracked the wireless key system used in nearly 100 million Volkswagen vehicles. Learn how the exploit...

Healthcare Data Breaches Hit Record Numbers

Healthcare Data Breaches Hit Record Numbers


Posted August 10, 2016 in Data Breach, HIPAA, Malware

One hacker caused 30% of all July data breaches, targeting healthcare providers. See the staggering numbers and why...

ProjectSauron: Advanced Malware Hidden for 5 Years

ProjectSauron: Advanced Malware Hidden for 5 Years


Posted August 9, 2016 in Malware, Data Breach, Cloud Security

Researchers discovered ProjectSauron, nation-state malware undetected for five years. Learn how this advanced threat...

Oracle Data Breach: Russian Hackers Strike POS Systems

Oracle Data Breach: Russian Hackers Strike POS Systems


Posted August 8, 2016 in Data Breach, Malware, Digital Forensics

Russian cybercriminals breached Oracle MICROS point-of-sale systems used by 330,000 businesses. Learn how the attack...

USB Drive Attacks: Why Found Devices Are Dangerous

USB Drive Attacks: Why Found Devices Are Dangerous


Posted August 8, 2016 in Malware, Data Breach, Cloud Security

Dropping infected USB drives is a proven hacker tactic. Nearly half of people who find one plug it in. Learn why this...

Gas Pump Bluetooth Skimmer Steals Card Data

Gas Pump Bluetooth Skimmer Steals Card Data


Posted August 8, 2016 in Data Breach, Malware, Compliance

Criminals install Bluetooth-enabled skimmers inside gas pumps to steal credit card data wirelessly. Learn how to...

NSA Zero-Day Stockpile: Security Help or Threat?

NSA Zero-Day Stockpile: Security Help or Threat?


Posted August 8, 2016 in Malware, Compliance, Data Breach

The NSA hoards unknown software vulnerabilities instead of reporting them. Discover why this controversial practice...

Olympic Cybercrime: Hackers Target Rio 2016

Olympic Cybercrime: Hackers Target Rio 2016


Posted August 8, 2016 in Malware, Data Breach, Compliance

Cybercriminals exploited the Rio Olympics with phishing, fake Wi-Fi hotspots, and credential theft. Learn the tactics...

Zero Days Documentary: Stuxnet Cyber Warfare Exposed

Zero Days Documentary: Stuxnet Cyber Warfare Exposed


Posted August 5, 2016 in Malware, Data Breach, Cloud Security

The Zero Days documentary reveals the true story of Stuxnet, the cyber weapon that changed warfare forever. A...