Tag "Cyber Attack"

Back to homepage
Industry Insights IT Compliance

HITRUST Common Security Framework – Improving Cyber Resilience?

A few weeks ago, Anthem agreed to a record $16 million HIPPA settlement with federal regulators to close the chapter on a data breach that exposed data on nearly 79 million individuals

Network Security

Access to Thousands of Breached Sites Found on Underground Market

By Vitali Kremez, Director of Reasearch at  Flashpoint, Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of

IT Compliance

Critical Flaw in GDPR Plug-In For WordPress

Hackers have been found exploiting a critical security vulnerability that affects a GDPR plug-in for WordPress to take control over vulnerable websites according to security researchers at Wordfence. “These attacks show that

Software

WannaCry Still Alive, Reaches Almost 75,000 Victims

WannaCry ransomware is still the most widespread cryptor family and has hit almost 75,000 users as of Q3 2018, according to new research from Kaspersky Lab. The firm discovered that since

Software

What are deepfakes? How and why they work

Deepfakes swap celebrities’ faces into porn videos and put words in politicians’ mouths, but they could do a lot worse. Deepfakes are fake videos or audio recordings that look and

Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Mobile Software

WhatsApp: Newest Attack Target for Mobile Phishing

Phishing attacks aren’t nearly as successful as they used to be because by now people have learned to look out for the emails that ask them to provide sensitive details.

Industry Insights

Why a Dog Bite is a Lesson in Handling Cyberattacks

A few weekends ago, my dog bit me. In his defense, it was dark and I had tackled him unexpectedly to stop him from walking off our under-construction, railing-less deck.

Industry Insights

Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital

Software

Understanding the art of phishing

The goal is to trick the recipient into believing the email is genuine, with the intention of getting the target to either download malware, or hand over personal information.Using cyber-attacks