Author: Alexandra Driscoll

Malvertisements hide in plain sight throughout the Internet, their unassuming and indistinguishable nature making them all the more lethal to users across the World Wide Web - sometimes the only interaction needed is to land on an otherwise nondescript webpage. And while researchers recently uncovered and killed the...

Ransomware attacks are skyrocketing in popularity - approximately $1 Billion spent in 2016 alone to free networks and data from hackers' grasps. Ransomware attacks occur when a hacker infiltrates your network, locks up everything and demands payment in return for the digital key. If that demand...

If you haven't noticed, this year is an election year - the Republican National Convention wrapped up this past week, and the Democratic National Convention in Philadelphia is in full swing. Both require a great deal of cyber security management and monitoring, and while the Republican National...

Applications are created every day that assist with financial and social intricacies of everyday life; however, there is a unique program called Civic that sends notifications when a particular social security number is used online. At its core, the service is akin to Credit Karma or even...

Unless you've been living under a rock in the middle of the ocean for the past few weeks, chances are you've heard of Pokemon GO. Though I'm fairly certain even those living under said rocks in the middle of the ocean have heard of it....

Firewalls are par for the course when it comes to discussing cyber security protection. From households to businesses, they're considered to be fairly simple and easy solutions to combat cyber security attacks. The types of attacks are becoming more unique and greater in quantity, meaning that groups...

Carmakers are quickly working toward full IoT integration with newer vehicle models, essentially creating rolling, horn-honking WiFi signals. It's great in theory - many have touted the ease at which they can find a song to listen to or the best directions to get to their chosen...

Darpa is giving white-hat hackers a chance to win $55 Million in the first-of-its-kind hack competition. The Cyber Grand Challenge takes normal hack-tivities a step beyond the norm and creates a competition where teams are not only using their skills to patch cyber security flaws in real...

Air-gapped systems are utilized by military and financial institutions around the world for their secure and practically impenetrable states - they utilize what is known as an air wall, meaning the network in question is not connected to the Internet or any other outside systems,...

We've written about two-factor authentication in the past, and how it is a vital part of any cyber security plan whether you are a single user or company with hundreds of employees. Though it does make challenging for an attacker to infiltrate your network with these precautionary...