Swipe With Care: Your ATM Might Be Controlled By A Hacker

debit_card_lock400.jpg

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to […]

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

ransomware_school400.jpg

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators […]

Artificial Intelligence Can Be Useful To Hackers, Too

ai_head_circut400.jpg

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory […]

5 Security Threats that Spell Doom for Any Organization

you_face_security_threats_400.jpg

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for. VirusesViruses are bits of code that plant […]

Tip of the Week: 9 Hacker Profiles You Need to Be Aware Of

cybercrime_classificiations_400.jpg

“Hacker” is a word that can bring up many powerful impressions in people. It may very well bring up images of a pale super genius hunched over a keyboard, awash in dim blue light, as it does for many people. However, this extremely specific image does little but pigeonhole the many hackers in the real […]

Rootkit Hacks are Nasty, But Preventable

rootkits_good_or_bad_400.jpg

The challenge for business owners is that there are so many different types of online threats, it borders on impossible to protect themselves from all of them. All of these threats hold limitless possibility to ruin your organization’s operations, either short-term or long-term. One of the most common threats out there is called a rootkit […]

Hack a Hospital and Get Blacklisted By Other Hackers

ethics_of_hackers_400.jpg

Hackers are notorious for committing cybercrimes and exploiting what seems like everybody and anybody. Yet, just as there exists honor among thieves, there’s an unwritten rule within the hacking community: leave hospitals alone. Of course, if you’re familiar with the activity of hackers, then you’ve perhaps heard of stories of hospitals and healthcare institutions getting […]

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

entertainment_hacked_400.jpg

It’s not an understatement to suggest that hackers are a hindrance to business. They take what doesn’t belong to them, and worse than that, they use that stolen information to make off with money, misrepresent individual actions, and ultimately, just cause a degree of added entropy that any business simply doesn’t need. Recently, with the […]

Tip of the Week: 5 Steps You Can Take to Foil the Plans of Hackers

best_practices_for_security_400.jpg

Hackers have the ability to cripple systems and steal important (or sensitive) data, and if you’re not careful your business could become their latest victim. Here are five ways that you can make it more difficult for hackers to infiltrate your systems and steal your data. Protect Important Security CredentialsHackers naturally target the credentials of […]

According to Hackers, Windows 10 Security Passes the Test

windows_10_black_hat_400.jpg

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the […]

Alert: New Petya Ransomware Spreads via Fake Online Resumes

ransomware_petya_400.jpg

Next time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya. Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen […]

Drugs, Assassins For Hire, Weapon Sales, and More: All Conveniently Found On the Web

b2ap3_thumbnail_cybercrime_black_market_400.jpg

The Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet. Specifically, the Internet (or what’s known as the […]

736 Million Records Were Exposed to Data Theft in 2015

b2ap3_thumbnail_stolen_data_problems_400.jpg

2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to […]

Man-In-the-Middle Attacks Find App Users Off Guard

b2ap3_thumbnail_man_in_the_middle_sphero_400.jpg

The Internet of Things is practically omnipresent in today’s environment, and many commercial products not only connect to the Internet, but they also come with an app. Due to this type of integration growing more popular, the world is starting to see Internet-connected products that really don’t have much to gain from their connectivity. One […]

Baseball Executive Pleads Guilty to Hacking Rival

b2ap3_thumbnail_baseball_hacker_400.jpg

IT can be like baseball. When a team is up to bat in a game of baseball, the team at bat is allowed to keep two coaches on the field. They are called the first base coach and the third base coach. While both coaches’ responsibilities mostly have to do with baserunning, the third base […]

Hacking Attacks Can Have Deadly Consequences

b2ap3_thumbnail_life_threatening_hack_400.jpg

We all know that hackers are never good news. All they want to do is ruin someone’s day by planting a threat in an innocent person’s PC or steal some data from a business. However, some hackers could potentially have much more dangerous (and deadly) agendas, like sabotaging hospital equipment. We know, you don’t often […]

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpg

There’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, […]

Pay a Hacker Ransom Money and Risk Getting Bamboozled Twice

b2ap3_thumbnail_distributed_denial_of_service_400.jpg

Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are […]

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpg

These days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate […]

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpg

With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to […]