Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Android Malware Earns Hackers $500K Per Day

Android Malware Earns Hackers $500K Per Day


Posted July 2, 2016 in Malware, Data Breach, Cloud Security

Dangerous Android malware mimics Facebook, Uber, and WhatsApp to steal data, earning hackers $500K daily. Protect...

Ransomware on Mobile: Your Phone Is Not Safe

Ransomware on Mobile: Your Phone Is Not Safe


Posted June 30, 2016 in Ransomware, Malware, Data Breach

Ransomware has spread from computers to smartphones. Learn how mobile ransomware works, which devices are at risk,...

Mass General Hospital Breach: 4,300 Records Hacked

Mass General Hospital Breach: 4,300 Records Hacked


Posted June 30, 2016 in Data Breach, Digital Forensics, Malware

Massachusetts General Hospital confirms 4,300 medical records were compromised in a data breach. See the impact and...

7 Tips to Avoid Being a Data Breach Victim

7 Tips to Avoid Being a Data Breach Victim


Posted June 29, 2016 in Data Breach, HIPAA, Malware

Data breaches have exposed millions of patient records. Follow these seven essential tips from Petronella to protect...

Mobile Account Hijacking: A New Identity Theft Threat

Mobile Account Hijacking: A New Identity Theft Threat


Posted June 28, 2016 in Compliance, Data Breach, Malware

Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...

Intel Admits Its Antivirus Software Is Useless

Intel Admits Its Antivirus Software Is Useless


Posted June 28, 2016 in Ransomware, Malware, Data Breach

Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...

Invisible ATM Skimmers: How to Protect Your Cards

Invisible ATM Skimmers: How to Protect Your Cards


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...

Pentagon Bug Bounty Reveals 100+ Vulnerabilities

Pentagon Bug Bounty Reveals 100+ Vulnerabilities


Posted June 15, 2016 in Penetration Testing, Data Breach, Malware

1,400 hackers found over 100 weaknesses in Pentagon networks through a sanctioned bug bounty program. See what they...

NSA Exploited MS Word Macros for Surveillance

NSA Exploited MS Word Macros for Surveillance


Posted June 13, 2016 in Compliance, Ransomware, Malware, Data Breach

Snowden emails reveal how the NSA weaponized Microsoft Word macros for spying. Discover the government surveillance...

Ransomware Costs Are Skyrocketing: What to Know

Ransomware Costs Are Skyrocketing: What to Know


Posted June 9, 2016 in Ransomware, Cryptocurrency, Bitcoin, Malware, Data Breach

Ransomware demands have increased dramatically as attacks surge worldwide. Learn why costs keep rising and how to...

Russia Arrests 50 Hackers in Largest-Ever Crackdown

Russia Arrests 50 Hackers in Largest-Ever Crackdown


Posted June 6, 2016 in Malware, Work from Home, Data Breach

Russia executes its largest hacker arrest in history, rounding up 50 cybercriminals. See what this unprecedented...

Dropbox Data Breach: What Really Happened

Dropbox Data Breach: What Really Happened


Posted June 6, 2016 in Data Breach, Cloud Security, Malware

Was Dropbox actually breached? Identity theft services wrongly reported 73 million accounts compromised. Get the...