Huge database leak reveals 1.37 billion email addresses and exposes illegal spam operation

“A faulty backup has inadvertently exposed the entire working database of notorious spam operator River City Media (RCM). In all, the database contains more than 1.37 billion email addresses, and for some records there are additional details such as names, real-world addresses, and IP addresses. It’s a situation that’s described as “a tangible threat to […]

‘Cyber Crime Is The Greatest Threat To Every Company In The World’

“The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Some vendor and media forecasts put the cybercrime figure as high as $500 billion and more. Then there’s the hacks and breaches which go […]

Top 5 cybersecurity facts, figures, and statistics for 2017

1. Cybercrime damage costs to hit $6 trillion annually by 2021. It all begins and ends with cybercrime. Without it, there’s nothing to cyber-defend. The cybersecurity community and major media have largely concurred on the prediction that cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion just a year […]

Microsoft warns ransomware cyber-attack is a wake-up call

https://tctechcrunch2011.files.wordpress.com/2016/07/microsoft.jpg?w=738

“A cyber-attack that has hit 150 countries since Friday should be treated by governments around the world as a “wake-up call”, Microsoft says. It blamed governments for storing data on software vulnerabilities which could then be accessed by hackers. It says the latest virus exploits a flaw in Microsoft Windows identified by, and stolen from, […]

Log in, look out: Cyberattack havoc may grow at week’s start

“An unprecedented ‘‘ransomware’’ cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek. As a loose global network of cybersecurity experts fought a rearguard battle against […]

Global Cyberattack Reaches ‘Unprecedented’ Scale

More than 150 countries have been hit by the coordinated hack, with some of the world’s largest institutions still struggling to recover. Friday’s global cyberattack on businesses, universities, and health systems has reached new size, with large institutions and security experts hurrying to address a breach that has now affected more than 150 countries. The […]

Explaining the Advantages of Cloud Computing

So you’re trying to get existing or prospective clients to move to the cloud, but they’re skeptical and resist. Perhaps they think cloud computing and cloud storage are just some fad that will disappear as fast as it rolled in. Sure, the cloud has become a bit of a buzzword, but that’s because those who […]

Stolen Laptop Leads to $2.5 Million HIPAA Breach Penalty

“The theft of a laptop computer containing information of nearly 1,400 patients was among two HIPAA breaches that led a Pennsylvania provider of remote heart monitoring to pay $2.5 million, federal authorities said this week. Malvern-based CardioNet, Inc., essentially had no process at all for securely managing electronic protected health information (ePHI) of the patients […]

Who’s Behind the Gmail Phishing Attack?

“The Gmail phishing attack that played out across Google’s billion-user email platform Wednesday afternoon was “particularly insidious” and created by someone with considerable skill, say cybersecurity experts. The scam involved sending users a malicious link from what looked like a familiar contact; when users clicked it and logged on, the hacker gained access to their […]

Intel chip flaw allows hackers to hijack thousands of PCs

https://www.extremetech.com/wp-content/uploads/2016/04/Intel-Feature.jpg

“Thousands of PCs could be vulnerable to an Intel security flaw that allows hackers to remotely hijack computers. The bug, which exists in Intel processors dating back almost a decade, allows cyber criminals to access a computer’s mouse and keyboard, granting them full access to the PC’s files and letting them install computer viruses even […]