Cyberattack Targets Florida Water Supply

It’s the nightmare scenario for most cybersecurity analysts, and one that they’ve increasingly warned about in recent years. A hacker decides to target a critical piece of infrastructure, like a power plant or any of the 55 National Critical Functions … Continue Reading

Encryption Key Storage

Protect Your Crypto Keys, Protect Your Data

Encryption has become a hot topic not only in the tech world but in the world of government as well. Adding backdoors to encrypted products is a movement of which many leaders are in favor. People are searching for more … Continue Reading

Thunderbolt Security Vulnerability

Flaw with Thunderbolt Technology Puts User Security at Risk

What was designed to be a tool for transferring data at faster speeds is now found to be anything but a convenient advancement. The Thunderbolt cable by Apple allows one computer system to connect to another for system migration or … Continue Reading

Value of Patient Health Records for Hackers

Why Healthcare Data Is Valuable to Hackers

If a cybercriminal gains access to your entire health record, that information becomes the target of every conceivable variation of a cyberattack. A health record contains some of the most sensitive personally identifiable information (PII) about a person. But perhaps … Continue Reading