Bank Regulator Downloads Data To Thumb Drive, Then Loses It
This is how something as innocuous as a thumb drive can become a major security issue. Recently, it has come to light that a soon-to-be retiring regulator at the Office of the Comp
Majority Of Employees Unsure How To Deal With Sensitive Information
What percentage of your employees know how to properly handle sensitive information? The answer is “probably a lot less than you think.” In a recent survey conducted by MediaPr
AtomBombing Attack Could Be Huge Threat To Windows PCs
Researchers at a cyber security company called EnSilo have found a new vulnerability in Windows PCs, and it’s about as bad as it could possibly get. The new attack vector does no
Android Users Should Be Aware Of New Drammer Hack
The Linux exploit called Rowhammer is back in the news. This time, it’s targeting Android devices. If you missed the news about Rowhammer, or need a refresher, the exploit basica
Hacked Smart Devices Are Being Used To Launch Web Attacks
Much has been written about the explosion in the size of the Internet of Things: a dizzying and rapidly growing collection of internet-connected objects that we use to make our liv
New Virus Poses As Dropbox Invoice
Dropbox is no stranger to hacking attacks, and in recent months, they’ve been made a target once again. In this instance, hackers have launched a phishing campaign aimed at Dropb
Running Linux? You May Be Next For A Ransomware Attack
Typically, people running some flavor of Linux have little to fear from the hacking community. By and large, Linux users have been ignored or passed by in favor of other targets. U
iOS Users: Apple Says Update Immediately
There is a large and growing body of evidence that hackers and their attacks are increasing in sophistication. Hardly a month goes by that there isn’t a headline somewhere in the
Samsung Phones Recalled Due To Battery Issue
Consumer electronics giant Samsung just released its latest update to its flagship product, the Galaxy Note 7, two weeks ago, as of the writing of this piece. The company has sold
Redis Database May Open Door To Ransomware Attack
As you probably know by now, ransomware is a particularly insidious form of hacking attack whereby a target computer’s files are locked or held hostage in some way, and besides r