hospital

New Research May Improve the Treatment of Sepsis

Grant-funded research may help create improved treatments for this condition. Septicemia occurs when your body has a severe immune response to an infection. When the body goes into septic shock, inflammation from the condition can lead to organ failure and potentially be fatal. According to the Centers for Disease Control and Prevention (CDC), one in […]

dell computer

Hidden For 12 Years, Dell Users At Risk Of Security Bug

Since 2009, this privilege-escalation bug has been present in every desktop computer, laptop computer, tablet and notebook shipped out by the infamous computer company. The security flaws, found within the company’s firmware update driver, could potentially allow security products to be bypassed along with unauthorized code execution. The local privilege-escalation (LPE) bugs exist in firmware […]

cybersecurity texting

Are You Protected Against Text-Based Phishing?

If your primary cell phone is a smartphone, you’re at risk of a “smishing” attack. Similar to phishing attacks, a bad actor will utilize text messages containing malicious links in order to get you to give up personal information, bank account numbers, etc by posing as a trusted source. These types of attacks have been […]

signal messaging app

Popular Phone Cracking Tool Gets Hacked by App CEO

Moxie Marlinspike, CEO of encrypted messaging app Signal, has just outed digital intelligence firm Cellebrite as having some less than stellar security practices. Marlinspike remarked in a blog post that the lack of security measures taken by Cellebrite could let someone re-write the data collected by the company. Since their business revolves around software that […]

social media platform

Do You Know Your Website Security Score?

More importantly, do you know the scores of other companies you interact with? And why is this important? Let’s take online shopping as an example. When you’re ordering a pair of shoes from Amazon, Walmart, wherever– are you thinking about what kinds of data security these companies have to ensure your safety? Probably not. Most […]

exam

60% of Employees Fail Simple Cybersecurity Quiz

According to a recent research study by TalentLMS, 70% of employees say they received cyber awareness training from their employer. Although that percentage may be high, a whopping 61% of those employees failed a basic cybersecurity quiz. What’s even more fascinating is that 60% of employees who failed the quiz report that they feel safe […]

social media

1 in 15 Users Exposed in Facebook Data Breach

The tech giant once again finds itself in hot water. Over 530 million users of the social media site had their personal information leaked via an online database. The sensitive data could be downloaded for free on the forum where it was posted. Phone numbers, names and dates of birth were among the personal data […]

hotel

Booking.com Punished With $500,000 Fine, Didn’t Immediately Disclose Breach

After a data breach occurred in 2019, Booking.com failed to report the breach in due time according to General Data Protection Regulation (GDPR) guidelines. They received a fine totaling half a million dollars for their error. Attackers were able to obtain login credentials of over 4,000 customers who had used the site to book hotel […]

tools

Increasing Cyber Threats To Manufacturing: Don’t Panic, Get The Facts

Since the beginning of 2019 and well into 2020, cybersecurity incidents for the manufacturing industry have been on the rise. Ransomware attacks alone have increased by 156%, and no doubt phishing scams have increased with them. Both of these social engineering tactics can cause issues, particularly to a manufacturer’s clientele. A data breach or network […]

world wide web

The Internet’s Hidden Foundation: Why You Should Be Concerned

It’s rarely discussed or even mentioned, but the cybersecurity risk from this critical infrastructure is nothing to scoff at. Cyber attacks and data breaches happen every day at every hour in the United States, Europe, and around the globe. We’re used to discussing cyber threats in the context of businesses and government entities. But what […]