ITRC_Remote work cybersecurity_845X684

There are more remote workers now than ever, either as telecommuting employees or freelancers. At the same time, more businesses than ever before are relying on these hard-working individuals to keep their companies in operation. The end result is people who don’t work in your building—or even live in your city—and who have never laid […]

In what has become a frequent event, another company has fallen victim to exposing their sensitive company information to the entire internet, all because they failed to password-protect their web-based storage system. LimeLeads, a San Francisco-based company that matches individuals and businesses with potential leads, left its internal database of users unsecured. The LimeLeads overexposure […]

A Golden Entertainment phishing attack is forcing the gaming company to see if any exposed information has been used in a harmful way and to look at ways to protect employees from possible attacks in the future. There are many different ways that hackers can strike. From infiltrating entire networks to installing viruses and malware, […]

There are a lot of different kinds of identity theft. One common form is a social media hack, which involves a hacker taking over control of your social media accounts. Compared to some of the other ways an identity thief can wreak havoc with your personally identifiable information, it might not seem like a big […]

Woman signing document

After much debate, it turns out abbreviating 2020 is not dangerous after all. When something gets posted online, there is a good chance that it can take on a life of its own. That seems to be what happened to an interesting tidbit of advice, posted by a Twitter user at the start of the […]

Paypal

A PayPal vulnerability in the login system was recently discovered by a white-hat hacker, allowing the company to create a patch for the problem. When we picture highly-skilled hackers at work, we might think of darkened rooms and faces peering out of black hoodies, lit by the glow of several computer monitors. At least, that […]

Epilepsy Foundation

The Epilepsy Foundation and law enforcement are on the hunt for hackers responsible for a recent Epilepsy Foundation Cyberattack. Data breaches and account takeovers tend to be fairly straightforward. Hackers break into a network, steal useful information and then use or sell that data to someone else. Sometimes, though, cybercrimes have a far more malicious […]

Ransomware

A business ransomware attack continues to be one of the most damaging, costly forms of cyberattacks against both businesses and consumers alike. Simply put, it is easy to pull off and it often works, all with little risk of discovery to the perpetrator. Most ransomware attacks involve a little bit of malicious software—either designed by […]

New York Special Olympics

It takes a bad criminal to attack donors to a beloved non-profit organization, but that is exactly what happened with the New York Special Olympics organization. Who Is It Targeting: Donors to the New York Special Olympics organization What Is It: Phishing attempt from a hijacked email list What Are They After: Many donors to […]

TikTok app

The U.S. Army is the latest branch of the armed services to issue an order against using TikTok. Who Is It Targeting: Video app users What Is It: Data theft, “leaky” app What Are They After: The U.S. Army just became the second branch of the military to warn its members that they are not […]