Aug 19, 2016 | Cyber-Crime, Data Breaches
If you are one of the 3.7 Millions patients who received letters from Banner Health this months, their hack might not be news to you. What might be news, is that you’re only one of 3.7 Millions Patients whose details were leaked during the hacking event. The...
Aug 18, 2016 | Buying Security Products, Carbonite, General Security
Do you really need a Cloud Backup Solution? The short answers is: Yes. Why yes, you do! We’re sure that you’re similar to most people; you probably have once-in-a-lifetime memories along with important personal files related to your family, work life and...
Aug 16, 2016 | Malware and Exploits
Security expert Vesselin Bontchev has scanned the WikiLeaks data-dump from Turkey’s ruling political party (AKP) and found at least 80 different malware strains contained within the emails. At Bontchev’s Github page, he published a neutered list of emails (the...
Aug 15, 2016 | Cyber-Crime, Malware and Exploits, Mobile Security
News broke a few days ago that 900 Million Android phones are vulnerable in a ‘quadrooter’ flaw – meaning there are FOUR ways for the phone to be ‘rooted’ or compromised. Over 900 million Android smartphones and tablets are vulnerable to...
Aug 13, 2016 | General Security
Microsoft has inadvertently leaked a “backdoor” means to digitally bypass ‘Secure Boot’, a firmware component designed to keep its devices sealed from outside tampering. Anyone with administrator rights who possesses the “golden keys,” as security...