Check Point security group has released information revealing how hackers are now using online video subtitles as a source to transport viruses into personal computers, granting hackers to endless information for very little work. This method of hacking requires a user to do nothing other than opening up their favorite videos online. According to a…
Quiz: How much do you know about cybersecurity?
Here is an interesting little quiz that is actually quite informative. It is by the Pew Research Center so it seems legit. Thanks for originally sharing it, Kevin Keane: How much do you know about cybersecurity? UPDATED: Read what the results show about overall cybersecurity understanding
Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?
Does the HIPAA Breach Notification Rule apply to all Covered Entities and Business Associates, Even Smaller Ones? To many of you reading this post this question seems ridiculous. You know the answer. However, I get asked this question so frequently that I decided to answer it with a blog post to save time next time…
WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
Good Article on Cybersecurity Basics
Here is a really good article, written in simple terms, talking about cybersecurity basics: What is Internet Security and Why You Should Know About It – SaferVPN blog
Business Email Compromise Explained in Less than 4 Minutes (Video)
Here is a nice video from Trend Micro that provides a good overview of what is often referred to as the business email compromise:
ALERT: Prepare Your Company for the Season of W-2 Email Scams
UPDATED: SEE BELOW IRS ‘Dirty Dozen’ Tax Scams For 2017 Include ID Theft & Bogus Refunds Hunting season just began — the season in which cybercriminals are hunting for W-2 information from your company. They do this by sending emails spoofing high-level executives, such as the company President or CEO, to lower level clerical personnel…
You must be logged in to post a comment.