Author: Alexandra Driscoll

According to TechCrunch, Sony announced recently that two factor authentication will be available on its PlayStation network (though, to be clear, a timeline has not been released), creating a greater security presence for users around the world. The corporation was most recently in the news for a security...

QuickTime has two vulnerabilities that are easy targets for remote attackers to overrun your Windows network, according to reports from Trend Micro and the Department of Homeland Security. Trend Micro discovered both problems and reported the issue last week. There are two pressing reasons for uninstalling QuickTime on your...

A zero day exploit normally takes the following form: attack occurs on a network or networks and chaos ensues. However, a rather unique use of a zero day exploit is gaining ground, begging the question of whether it will be used in similar instances in...

If readers have heard about Petya, the newest in a slew of recent ransomware attacks, hopefully it's been through a blog like this. The newest "IT" malware attack to hit the scene, Petya is hidden within documents attached to emails that purportedly come from someone...

DDoS attacks are an ever-present threat in the business world, and can have a huge impact on revenue. But how many of these enterprises are taking proper precautions? What are they doing to mitigate their risk? A report form Neustar provides insight into how enterprises are being...

As part of a new initiative aimed at learning more about their cyber security strengths and weaknesses, the Pentagon is hosting a competition for the best and brightest hackers around the country. The goal? To hack into their network and shine a light on any vulnerabilities...

News of MedStar Health's malware attack, as reported on Monday, was at first met with shock and then a resounding (albeit internal) "Again?!". Unfortunately a lot of healthcare providers across the country have been hit with varying degrees of ransomware attacks. Whether through spear phishing campaigns...

In today’s digital world, “data” has quickly become a top buzz word. Many don't realize that your ISP (Internet Service Provider) is a data aggregator, collecting troves of data about each user online. ISPs and other companies collect enormous amounts of data, leading to the now-familiar...

It may not be breaking news, but this is a major announcement that companies need to embrace: passwords are out; multifactor authentication is in. In it's simplest form, an ATM transaction is an example of multifactor authentication usage - you need to not only produce your...

As the battle rages between Apple and the FBI in the media and courts, more applications and programs are coming to light that use end-to-end encryption. From popular messaging programs and applications to email servers and beyond, authorities from around the world are running into...