Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Critical HTTP/2 Vulnerabilities Discovered

Critical HTTP/2 Vulnerabilities Discovered


Posted August 4, 2016 in Malware, Data Breach, Cloud Security

Researchers found major security flaws in HTTP/2 that undermine its safety claims. Learn what these vulnerabilities...

PayPal Phishing Scam Uses Legit Email Accounts

PayPal Phishing Scam Uses Legit Email Accounts


Posted August 2, 2016 in Malware, Data Breach, Cloud Security

Cybercriminals now send phishing links from real PayPal accounts with fake payment requests. Learn to spot this...

Russian Hackers and Voting Machines: Election Risk

Russian Hackers and Voting Machines: Election Risk


Posted August 1, 2016 in Data Breach, Malware, Cloud Security

Could foreign hackers compromise US voting machines? Explore the real cybersecurity threats to election...

Small Business Cyberattacks: Why You Are a Target

Small Business Cyberattacks: Why You Are a Target


Posted July 28, 2016 in Data Breach, Cloud Security, Malware

Hackers increasingly target small businesses with weaker defenses. Learn the latest attack trends and proven steps to...

Biometric Security: Convenience vs. Privacy Risk

Biometric Security: Convenience vs. Privacy Risk


Posted July 28, 2016 in Data Breach, Malware, Cloud Security

Fingerprint and facial recognition unlock devices fast, but biometric data breaches are permanent. Weigh the real...

Every Windows Password Cracked in Under 6 Hours

Every Windows Password Cracked in Under 6 Hours


Posted July 27, 2016 in Malware, AI, Cloud Security

A security researcher built a machine that cracks any Windows password in six hours. Learn why this matters and how...

LastPass Vulnerability Could Expose All Your Passwords

LastPass Vulnerability Could Expose All Your Passwords


Posted July 27, 2016 in Malware, Data Breach, Cloud Security

A critical LastPass vulnerability could give hackers access to every stored password. Learn what happened and how to...

5 Critical Cybersecurity Gaps in Healthcare

5 Critical Cybersecurity Gaps in Healthcare


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

A two-year study reveals healthcare organizations are dangerously unprepared for cyberattacks. See the top 5 concerns...

Why SMS Two-Factor Authentication Is No Longer Safe

Why SMS Two-Factor Authentication Is No Longer Safe


Posted July 26, 2016 in Data Breach, Malware, Cloud Security

Text-based two-factor authentication is being phased out due to security risks. Learn why SMS codes are vulnerable...

DNC Email Leak Exposes Cybersecurity Hypocrisy

DNC Email Leak Exposes Cybersecurity Hypocrisy


Posted July 25, 2016 in Malware, Data Breach, Compliance

DNC staffers mocked a cybersecurity warning just months before their system was hacked. See the ironic emails exposed...

Snowden Designs Anti-Surveillance Phone Device

Snowden Designs Anti-Surveillance Phone Device


Posted July 23, 2016 in Data Breach, AI, Malware

Edward Snowden unveils a hardware device designed to detect phone surveillance. Learn how this anti-spying technology...

Locky Ransomware Now Works Offline: What to Know

Locky Ransomware Now Works Offline: What to Know


Posted July 22, 2016 in Ransomware, Malware, Cloud Security

The Locky ransomware strain now encrypts files without an internet connection. This dangerous evolution makes it...