Thursday, October 18, 2018
russian election hacks

Federal Government Informs Local Election Officials of Possible Russian Election Hack

Almost nothing has been more (frightfully) entertaining than Trump’s tweets. His most recent back-and-forth with the NBA champion Golden State Warriors has been particularly entertaining. But at the top of Donald’s...
infected CCleaner software

Be Careful Who You Hire

Imagine you hire a professional cleaning company to do some work on your house. Now imagine that you hired the wrong cleaning company, and they actually double as mercenaries hired to...
Equifax Cyber Security Breach

“It’s Time to Intervene!”

Imagine if the world had superheroes. What if Batman was real? What if Spider Man really could be seen swinging throughout downtown New York City? For many, this is who comes...
Zomato

Restaurant App Zomato Gets Hacked, 17 Million Users’ Data Stolen

When is the last time you’ve changed your password? For most of us, it’s been too long since we’ve changed them to keep our accounts safe, despite the common knowledge that...
Car Jacking

The Hooligans: High Tech Car Jacking

In the summer of 2014 an investigation arose after dozens of Jeep Wranglers were victims of car jacking, seemingly right from under their owner’s nose, with no traces of evidence left...
microsoft hydra

Windows bugs have come to resemble the Hydra of Ancient Mythology

The Lernaean Hydra in Roman mythology was a frightening beast. It had seven snake heads. If a warrior cut off one of the heads, it simply regrew while the others continued...
onelogin

OneLogin: Another One Bites the Dust

The 1980 Queen hit ‘Another One Bites the Dust’ was an anthem for the 80s generation. But it also happens to describe security systems nearly 40 years later. After the massive...

WordPress – the Good, the Bad and the Ugly

The formula is pretty simple, really. Take something that is widely popular but wildly complex, and make it simple. Really simple. You’ll have people eating out of your hands. That’s exactly...
Viruses

World War Z – Zero-day Viruses and New Risks

In most epidemic films, virus hunters are looking for the infamous ‘Patient Zero’ - the first patient to have contracted the virus, and who then played host for the massive spread...

APPLICATIONS

Like Bees To Honey – How Honeypot Security Can Save Your...

A new and proactive solution to protecting networks from attack, both external and internal, is to deploy a honeypot security system within the network....
innovation economy

The Best Part of a Sandwich

HOT NEWS