Anatomy Of A Social Media Attack

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype’s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Continue Reading…

0Shares

2016 Cybercrime Report by Cybersecurity Ventures

Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021. This special report on cybercrime is sponsored by Herjavec Group, a leading global information security advisory firm and Managed Security Services Provider (MSSP) with offices across Canada, the United States, United Kingdom and Australia.

Continue Reading…

0Shares

IPhone Users Urged to Update Your IPhone Due to Major Security Flaws

Apple released a critical iOS update today to fix an exploit that allowed malware to be installed on an iPhone with a single tap.

A report from Vice reveals the details of the exploit used to target Emirati human rights activist Ahmed Mansoor. Mansoor received a suspicious text that read, “New secrets about torture of Emiratis in state prisons” and included a link.Continue Reading…

0Shares

This is How Hackers Can Hijack Cell Phone Towers!

You and I are afraid of somebody hacking our smartphones and stealing critical information, but what happens when hackers hijack a whole cellular network by hacking into cellphone towers? No, this is not an empty threat because, security researchers from the mobile security firm, Zimperium have discovered three serious security flaws in BTS stations which can allow potential hacker remotely hijack the entire cell phone tower. The Zimperium researchers have said that the flaw is so critical that it allows hackers to abuse, hijack, and crash mobile cell towers.

Continue Reading…

0Shares

8 Tips for Protecting Your Customers’ Data

With data breaches running rampant these days, trying to ensure that your customers’ sensitive data should be a top priority. But it can also be scary; are you really able, as a small business, to protect that information from potential hackers?

Just like with any potential threat, there are always practices you can implement that can shore up your security and reduce the risk of a data breach. Here are a few simple (and affordable) practices to start implementing today.

Continue Reading…

0Shares

OBX Hospital Warns About Data Privacy Breach

The Outer Banks Hospital is providing notice of a recent data event that may have compromised the security of personal information relating to current and former patients who received treatment at the OBX Cardiopulmonary Rehabilitation program of Eastern Carolina Cardiovascular, P.A., located in Kitty Hawk, NC, from 2004 until June of 2016.Continue Reading…

0Shares

Millions of Steam Game Keys Stolen

More than nine million keys used to redeem and activate games on the Steam, a popular games forum, have apparently been stolen by a hacker.

The site, DLH.net, that provides news, reviews, cheat codes, and boards, was breached on July 31 by an unnamed hacker. While the name of the hacker is not known, it is speculated that it is the same hacker responsible for an earlier compromise of a Dota 2 forum that resulted in the theft of nearly two million user accounts record.

Continue Reading…

0Shares