Network Security

How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to…

7 years ago

Malware hits 500k IoT devices, Talos reports

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up…

7 years ago

Don’t give social media hackers a chance

Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your…

7 years ago

The Facebook data breach scandal explained

Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But…

7 years ago

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails…

7 years ago

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting…

7 years ago

More leaks from Equifax breach

The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of…

7 years ago

The Ashley Madison hack and your company

You’re probably all too aware of the Ashley Madison hack by now. Maybe you are closely following the names and…

7 years ago

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and…

7 years ago

WhatsApp bug exposes users to hackers

Vulnerabilities in the web-based version of popular instant messaging app WhatsApp recently left up to 200 million users exposed to…

7 years ago

This website uses cookies.