Back to homepage

Social media makes phishing attacks easy

People like getting friend requests on social media, and hackers are using that to launch successful phishing campaigns. This is according to a new report released by phishd by MMR

Identity Theft

Roberts Hawaii tour company hacked, credit card and personal info exposedSecurity Affairs

Did you visit the Hawaii in last year? The tour company Roberts Hawaii is warning its customers about a data breach that may affect people who purchased tours from July 2015

Identity Theft

Stolen EHR data is flooding criminal underground communities in the Deep WebSecurity Affairs

Electronic health record databases are becoming the most precious commodities in the cyber criminal underground. The healthcare sector has been the industry with the highest number of data breaches in


To The Cloud, But Securely – Information Security Buzz

By now, you’ve seen some breakdown of SaaS vs. PaaS vs IaaS, with respect to security. You’ve also probably seen the most common piece of security advice, which is “patch


ESET researchers uncover new Android banking botnet – IT SECURITY GURU

In their investigation of the botnet-forming Android banking malware, discovered on Google Play, ESET researchers discovered that both the Android Trojans and the C&C server were built using source code

BYOD/Big Data

Majority of global healthcare enterprises using cloud, big data and IoT without securing sensitive data – IT SECURITY GURU

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, Healthcare Edition, issued in conjunction with analyst firm 451

Identity Theft

Is identity theft insurance worth it? –

Whether you’re shopping online or swiping your card at a store, hackers have lots of opportunities to steal your identity. In 2015 alone, $15 billion dollars was stolen from 13.1


How IoT initiatives impact the IT infrastructure – Help Net Security

Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data management, and new networking elements

Industry Insights

The failure of EU’s regulation on cyber-surveillance tech exports – Help Net Security

When in April 2016 the Italian Ministry of Economical Progress revoked Hacking Team’s licence to export their Galileo remote control software outside of the EU, it seemed, at first glance,

Identity Theft

Healthcare Data Breaches Up 40% Since 2015 – Medpage Today

When a U.S. Attorney called South Florida “an epicenter of identity theft” last month, it was in the context of announcing federal charges against more than 100 suspected fraudsters. One