Search Results for: USB sticks Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This... Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Blog Post Cold Boot Attacks to Decrypt All Modern Computers September 17, 2018 Researchers have revealed that hackers can steal encryption keys, credentials to corporate networks and passwords as long as they have... Blog Post Heathrow Airport Launches Investigation after Cybersecurity Breach October 30, 2017 Heathrow Airport, the world’s second busiest airport by international passenger traffic, has launched an investigation after a USB stick containing... Blog Post Iowa Student Arrested for Changing Grades Using Keylogger Malware November 6, 2017 A former student at the University of Iowa has been arrested in his hometown of Denver after using hardware keyloggers... Blog Post Brinks’ Secure Safe Can Be Hacked by a USB Stick July 29, 2015 Security researchers have discovered a significant vulnerability in Brinks' CompuSafe Galileo, easily exploitable by regular employees with a USB drive. Blog Post Weird Security Term of the Week: “Multi-Factor Authentication” August 7, 2016 The Problem: Restricting access is not a new concept by any means. Guards and gatekeepers have been around for millennia,... Blog Post Researcher: Chrysler Vehicle Hack ‘Recall’ Potentially Damaging July 28, 2015 Fiat Chrysler's massive recall of 1.4 million vehicles by mailing USB drives containing the software patch could backfire spectacularly, says a researcher. Blog Post BadUSB – Attack Explained (Video) October 29, 2014 For those of you that might have missed one of the hottest topics of this month, the BadUSB attack method,... Blog Post Tesla Issues Patches for Vulnerabilities Discovered by Hackers August 8, 2015 Vehicle manufacturer Tesla has released a patch in quick response to fix all six vulnerabilities found by security researchers in its Model S car. Blog Post Hackers Remotely Hijack a Jeep While It’s Being Driven! July 22, 2015 Two security researchers remotely hack a Chrysler vehicle by using a phone and a laptop to take complete control of the car, while it's on the road. Blog Post PoSeidon Case: How to Prevent POS Malware from Stealing Data April 14, 2015 How can we prevent POS malware, such as the recent PoSeidon malware from stealing any more credit card information? The answer is simple. Blog Post BadUSB: Time to Start Checking Your Laptop’s USB Ports Before Turning On October 4, 2014 A security researcher duo released the tools and tutorial on how to turn your USB drive into a cyberweapon. Blog Post Weird Security Term of the Week: "Air Gap" April 7, 2015 "Air Gap" has been a hot topic recently and we've decided to take a look at some of the ways you can protect your systems against this type of attacks.
Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This...
Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Blog Post Cold Boot Attacks to Decrypt All Modern Computers September 17, 2018 Researchers have revealed that hackers can steal encryption keys, credentials to corporate networks and passwords as long as they have...
Blog Post Heathrow Airport Launches Investigation after Cybersecurity Breach October 30, 2017 Heathrow Airport, the world’s second busiest airport by international passenger traffic, has launched an investigation after a USB stick containing...
Blog Post Iowa Student Arrested for Changing Grades Using Keylogger Malware November 6, 2017 A former student at the University of Iowa has been arrested in his hometown of Denver after using hardware keyloggers...
Blog Post Brinks’ Secure Safe Can Be Hacked by a USB Stick July 29, 2015 Security researchers have discovered a significant vulnerability in Brinks' CompuSafe Galileo, easily exploitable by regular employees with a USB drive.
Blog Post Weird Security Term of the Week: “Multi-Factor Authentication” August 7, 2016 The Problem: Restricting access is not a new concept by any means. Guards and gatekeepers have been around for millennia,...
Blog Post Researcher: Chrysler Vehicle Hack ‘Recall’ Potentially Damaging July 28, 2015 Fiat Chrysler's massive recall of 1.4 million vehicles by mailing USB drives containing the software patch could backfire spectacularly, says a researcher.
Blog Post BadUSB – Attack Explained (Video) October 29, 2014 For those of you that might have missed one of the hottest topics of this month, the BadUSB attack method,...
Blog Post Tesla Issues Patches for Vulnerabilities Discovered by Hackers August 8, 2015 Vehicle manufacturer Tesla has released a patch in quick response to fix all six vulnerabilities found by security researchers in its Model S car.
Blog Post Hackers Remotely Hijack a Jeep While It’s Being Driven! July 22, 2015 Two security researchers remotely hack a Chrysler vehicle by using a phone and a laptop to take complete control of the car, while it's on the road.
Blog Post PoSeidon Case: How to Prevent POS Malware from Stealing Data April 14, 2015 How can we prevent POS malware, such as the recent PoSeidon malware from stealing any more credit card information? The answer is simple.
Blog Post BadUSB: Time to Start Checking Your Laptop’s USB Ports Before Turning On October 4, 2014 A security researcher duo released the tools and tutorial on how to turn your USB drive into a cyberweapon.
Blog Post Weird Security Term of the Week: "Air Gap" April 7, 2015 "Air Gap" has been a hot topic recently and we've decided to take a look at some of the ways you can protect your systems against this type of attacks.