With wireless smartphone networks improving daily and keeping people connected nearly everywhere they go, it is no wonder why social media networks have continued to gain popularity over the years, with new networks popping up all the time. While many people check their social networks at any extra second they have, the constant updates can […]
As the world moves even further into the digital age, login credentials such as a username and password become a digital identity, one many people fail to properly protect. Many people use the same password for all their accounts or write their login information down in plain sight for the world to see. While it […]
Background Yahoo was compromised in 2014 by a group of professional blackhats who were hired to compromise customer databases from a variety of different targeted organizations. Some of their initial targets, which occurred in 2012 and 2013, are linked directly with the recent large scale data breaches of social media networks and online-services such as […]
InfoArmor has identified a special tool used by cybercriminals to distribute malware by packaging it with the most popular torrent files on the Internet. The bad actors have analyzed trends on video, audio, software and other digital content downloads from around the globe and have created seeds on famous torrent trackers using weaponized torrents packaged […]
In November 2015, InfoArmor identified the GovRAT malware that possessed advanced cyberespionage functionalities and documented these findings in the GovRAT Intelligence Report. Research indicated that GovRAT and the bad actors involved were targeting government and military assets. InfoArmor alerted the identified agencies and targets in order to prevent data exfiltration and to collect actual and […]
While mobile devices have become such a common part of daily life, they can also pose risks to your digital identity and financial wellness.
Thieves are on the prowl for your information in order to steal your identity. Safeguarding your Personally Identifiable Information (PII) is the key to keeping your identity secure.
In InfoArmor’s report, “Healthcare Is Under Attack,” our underground research team identified multiple instances where cyber criminals had infiltrated EHR systems and leveraged the compromised data for extortion and ransom.
Hacking creates a dilemma for operators of other popular consumer web services. They can require all users to change their passwords, and risk losing some users. If they don’t force password changes, users’ accounts could be hacked.
Whether your kids are going into second grade or their senior year, digital threats are out there. Maintaining a strong layer of digital protection for your kids can be greatly enhanced by taking a few simple precautions.