McAfee twitter account hacked, cryptocurrencies may be next

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter account had been hacked. This curious turn of events had occurred in order to promote specific alternative cryptocurrencies to invest in. Last week, McAfee’t twitter account had been hacked and

Read More »

Forever 21…for the hackers with new credit card information

Hello all! We hope everyone had a nice relaxing holiday before the new year was rang in! Unfortunately during the holiday rest, someone got a little too relaxed. The known clothing company “Forever 21” was a victim of another security breach for the 2017 year. The popular clothing store had apparently been hit with malware

Read More »

Cloud security going into 2018

The cloud is becoming more and more preferred as times goes by. Data and applications are streaming to it at a faster rate every hour, and more people are deciding to turn to cloud services on a daily. There is no question as to why this is happening, the cloud services are extremely convenient and

Read More »

2018 predictions: Healthcare security breach

As we all have become aware, 2017 was a free for all when it comes to security breaches.  There were countless phishing scams, ransomware, state-sponsored attacks and new forms of attacks that all made headlines and shook us to our boots. However 2018 means a new year and a new us! Right? Well we hope

Read More »

2018 security expenses expected to rise in response to 2017

2017 was full of news on companies and corporations that had security breaches, and the effects on the masses that would follow because of them. Because of this hard pressed security year, it is expected that in 2018, the total expenses on security spending will rise, by about an estimated 8%. A research firm known

Read More »

The most popular passwords, proven by hacked accounts

So apparently, every year SplashData compiles a list of passwords and rates them according to occurrence. These passwords are from accounts that have been stolen and made public. There are millions of these accounts and the similarities in the passwords show the unoriginal ideas people come up with to secure their information. Due to the

Read More »