Data protection is a team effort

How Internet Service Providers Should Handle Cybersecurity?

In June, we asked our readers what, in their opinion, should protect them from hackers. The internet service providers (ISP) were on the top of most people’s minds. It’s clear that people expect to feel safe at their smart homes. But are Internet service providers ready to provide excellent levels of security? Equifax, Yahoo, and CCleaner didn’t plan for a massive loss …

Hackers Can Change an Email after It’s Already in Your Inbox

This week, researchers have uncovered an email hack that allows hackers to modify emails once they are already in your inbox. What is it? Francisco Ribeiro, a researcher at Mimecast discovered this exploit and called it Ropemaker. The cryptic name stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky and takes advantage of CSS and HTML. This particular …

The Worst Cybersecurity Attacks and Leaks of 2017

We are a little more than halfway into 2017, and already we’ve seen a tremendous amount of cybercrime. We have seen attacks not only on home users but also hospitals, major corporations, governments. While there is a broad range of estimates as to how much each attack cost the world, one this is for certain: security needs to step it …

CUJO hacks: video how CUJO stops Petya ransomware

This week, there is a new ransomware attack infecting airlines, banks, and utilities across Europe and the US. Reminiscent of last month’s WannaCry attack, there is a ransomware exploiting vulnerabilities in the Windows operating system. Once a computer is infected, the hard drive is encrypted with a private key, meaning only the attacker has access to the data. The hackers …

What was the last thing you printed?

CUJO hacks: see how hackers can access the documents you print

To many, a printer may seem like an unlikely target for hacking. IoT devices are often overlooked and unprotected by the standard security methods, such as antivirus and routers. It is important to remember that an unsecured printer can leave you as vulnerable as an unsecured computer or smartphone. Hackers can scrape your sensitive documents off your printer without you …

Avoiding a baby monitor hack

A June 2016 headline from the San Francisco Globe read: “Stranger hacks family’s baby monitor and talks to the child at night.” And if you were hoping that this oddball hacker was just talking or goofing around, your hopes have to be dashed because he was saying extremely “disturbing messages into the device.” What happened? Not only was the hacker …