Cyber News Rundown: ZeroCleare Malware
Reading Time: ~ 2 min. ZeroCleare Malware Wiping Systems IBM researchers have been tracking the steady rise in ZeroCleare deployments throughout the last year, culminating in a significant rise in...
View ArticleCyber News Rundown: Zeppelin Ransomware
Reading Time: ~ 2 min. Zeppelin Ransomware Spreading Over the last month, researchers have been monitoring the spread of a new ransomware variant, Zeppelin. This is the latest version of the...
View ArticleCybersecurity Tips for Online Holiday Shopping
Reading Time: ~ 4 min. The holiday shopping season is prime time for digital purchases and cybercriminals are cashing in on the merriment. With online shopping officially becoming more popular than...
View ArticleCybersecurity Predictions for 2020: What Our Experts Have to Say
Reading Time: ~ 3 min. As the year draws to a close, the cybersecurity analysts at Webroot and Carbonite pull out their crystal balls to make their predictions for the year ahead. Our experts predict...
View ArticleCyber News Rundown: Honda Customer Data Leak
Reading Time: ~ 2 min. Honda Customer Database Exposed Officials have been working over the past work to secure a database containing highly sensitive information belonging to more than 26,000 North...
View ArticleCyber News Rundown: US Coast Guard Hit with Ransomware
Reading Time: ~ 2 min. US Coast Guard Facility Hit with Ransomware During the last week of December a US Coast Guard facility was the target of a Ryuk ransomware attack that shut down operations for...
View ArticleCyber News Rundown: Snake Ransomware
Reading Time: ~ 2 min. Snake Ransomware Slithers Through Networks A new ransomware variant, dubbed “Snake,” has been found using more sophisticated obfuscation while targeting entire networks, rather...
View ArticleCyber News Rundown: Ryuk Uses Wake-on-Lan
Reading Time: ~ 2 min. Ryuk Adds New Features to Increase Devastation The latest variant of the devastating Ryuk ransomware has been spotted with a new feature that allows it to turn on devices...
View ArticleCyber News Rundown: Cannabis User Data Breach
Reading Time: ~ 2 min. Point-of-Sale Breach Targets U.S. Cannabis Industry Late last month, researchers discovered a database owned by the company THSuite that appeared to contain information belonging...
View ArticleCyber News Rundown: Magecart Hackers Arrested
Reading Time: ~ 2 min. Indonesian Magecart Hackers Arrested At least three individuals were arrested in connection to the infamous Magecart information stealing malware. Thanks to the combined efforts...
View ArticleCyber News Rundown: Emotet Targets Tax Season
Reading Time: ~ 2 min. Tax Season Brings Emotet to the Front As Americans prepare for tax season, Emotet authors have started a new campaign that imitates a W-9 tax form requested by the target. As...
View ArticleCyber News Rundown: Estée Lauder Data Exposed
Reading Time: ~ 2 min. Estée Lauder Leaves Massive Database Unprotected Earlier this week researchers discovered an unsecured database containing over 440 million records belonging to Estee Lauder, a...
View Article5 Security Tips for Setting Up a New Device
Reading Time: ~ 3 min. The last thing you want to do when you get a new computer, mobile device, or tablet is spend a lot of time setting it up. But like any major appliance, these devices are...
View ArticleCyber News Rundown: Paradise Ransomware
Reading Time: ~ 2 min. Paradise Ransomware Spreading Through Unusual Attachments While Paradise ransomware isn’t new to the scene, the latest methods it’s using to spread are a bit surprising. Though...
View ArticleWorld Backup Day: A Seriously Good Idea
Reading Time: ~ 3 min. “Cold Cuts Day,” “National Anthem Day,” “What if Cats and Dogs had Opposable Thumbs Day”… If you’ve never heard of World Backup Day, you’d be forgiven for thinking it’s another...
View ArticleStaying Cyber Resilient During a Pandemic
Reading Time: ~ 3 min. We’re all thinking about it, so let’s call it out by name right away. The novel coronavirus, COVID-19, is a big deal. For many of us, the structure of our lives is changing...
View ArticleCyber News Rundown: DDoS Strikes U.S. Health Department
Reading Time: ~ 2 min. DDoS Attack Strikes U.S. Health Department Amidst the panic caused by the novel coronavirus, millions of people began navigating to the U.S. Department of Health’s website to...
View ArticleHackers: Fact vs. Fiction
Reading Time: ~ 3 min. Have you ever watched a movie and seen a character doing something you know how to do, and thought to yourself, “jeez, that’s totally wrong. Couldn’t they have done a little...
View ArticleCyber News Rundown: WHO Under Cyberattack
Reading Time: ~ 2 min. World Health Organization Sees Rise in Cyberattacks Officials for the World Health Organization (WHO) have announced that many of their sites and servers have been under attack...
View ArticleLost or Stolen Device? Here’s What to do Next
Reading Time: ~ 4 min. It’s a nightmare, it’s inconvenient, and it’s inevitable. Losing or having your smart device stolen poses a significant, looming privacy risk— we just don’t like to think about...
View Article