Author: Alexandra Driscoll

Google Play Store users confronted an unfortunate surprise when illegitimate banking applications were outed on the popular site. A cyber security risk doesn't faze mobile device owners as they download an application from the online store of their choice (Apple, Google, and others) without a second thought. The...

Cyberespionage group Platinum is utilizing an obscure Windows feature called hotpatching to better hide malware from security monitoring. The attacks are prevalent throughout South and Southeast Asia, in particular Indonesia, China, and Malaysia. Platinum has been operational since 2009 and tends to lean toward spear phishing...

MIT's Computer Science and Artificial Intelligence Laboratory unveiled its latest creation - AI^2 (read: AI squared), a machine that will hopefully be a powerful addition to those in the cyber security industry. The reason this particular artificial intelligence is so significant has to do with its strengths -...

According to TechCrunch, Sony announced recently that two factor authentication will be available on its PlayStation network (though, to be clear, a timeline has not been released), creating a greater security presence for users around the world. The corporation was most recently in the news for a security...

QuickTime has two vulnerabilities that are easy targets for remote attackers to overrun your Windows network, according to reports from Trend Micro and the Department of Homeland Security. Trend Micro discovered both problems and reported the issue last week. There are two pressing reasons for uninstalling QuickTime on your...

A zero day exploit normally takes the following form: attack occurs on a network or networks and chaos ensues. However, a rather unique use of a zero day exploit is gaining ground, begging the question of whether it will be used in similar instances in...

If readers have heard about Petya, the newest in a slew of recent ransomware attacks, hopefully it's been through a blog like this. The newest "IT" malware attack to hit the scene, Petya is hidden within documents attached to emails that purportedly come from someone...

DDoS attacks are an ever-present threat in the business world, and can have a huge impact on revenue. But how many of these enterprises are taking proper precautions? What are they doing to mitigate their risk? A report form Neustar provides insight into how enterprises are being...

As part of a new initiative aimed at learning more about their cyber security strengths and weaknesses, the Pentagon is hosting a competition for the best and brightest hackers around the country. The goal? To hack into their network and shine a light on any vulnerabilities...

News of MedStar Health's malware attack, as reported on Monday, was at first met with shock and then a resounding (albeit internal) "Again?!". Unfortunately a lot of healthcare providers across the country have been hit with varying degrees of ransomware attacks. Whether through spear phishing campaigns...