In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it[...]
Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP site[...]
If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of[...]
First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing health[...]
A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by n[...]
Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy[...]
Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of the[...]
Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading m[...]
As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensi[...]
The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of v[...]