Get in Touch
Celebrity Data Stolen in Major Data Breach
A major entertainment and media law firm experienced a massive data breach that may have compromised the data of many celebrities including Bruce Springsteen,...
Minimizing Your Cyber Risk: Third Certainty #17
In the seventeenth installment of Third Certainty, Adam Levin explains how some services and help keep companies and their employees safe from cyber fails.
Do Password Managers Make You More or Less Secure?
It’s World Password Day, and much like every other day of the year, the state of password security is terrible.
Despite repeated warnings from security...
Indecent Exposure: 7TB of Adult Streaming User Data Unsecured on Server
Users on an adult streaming platform may have experienced the wrong kind of exposure when over seven terabytes of data was found on an...
68% of Pharma Executives Have Had Credentials Breached Online
The online credentials for 68% of pharmaceutical executives analyzed for a study have been compromised recently.
The study, conducted by cybersecurity firm Blackcloak, found that...
Ghost Blogging Platform Hacked To Mine Cryptocurrency
Hackers successfully breached the servers of a popular blogging platform and used them to mine cryptocurrency.
Ghost, a Singapore-based blogging platform with 2,000,000 installations and...
Cybercriminals Are Exploiting the Covid-19 Pandemic
Cybercriminals are actively targeting Covid-19 hotspots with malware and phishing campaigns, according to a new report from Bitdefender.
The report, “Coronavirus-themed Threat Reports Haven’t Flattened...
What E-Commerce Sites Can Learn from the Covid-19 Pandemic
For the last few years, cybersecurity experts have been sounding the alarm on something called e-skimming. In this kind of attack, hackers intercept payment...
Rethinking Zoom? How WebEx, Teams, and Google Meet and Duo Compare...
If you're among the many looking for a new video conferencing tool after adding "zoombombing" to your vocabulary, you're in luck. While a one-size-fits-all solution...
New Program Allows Realtime Deepfakes on Zoom, Skype
A newly released program allows users to create real-time deepfakes on video conferencing platforms including Zoom, and Skype.
Avatarify is an open-source program that can...
Adam Levin Warns of Stimulus Check Scams on CNBC
Adam Levin was featured on CNBC where he warned of the new wave of scams targeting recipients of stimulus checks.
“They’re looking to get sensitive...
Zoom Zero-Day Exploits Up For Sale on the Dark Web
Two critical zero-day exploits for the Zoom video conferencing platform just hit the market.
The alleged exploits take advantage of vulnerabilities in Zoom’s Windows and...
Your Email Needs to Shelter in Place, Too
The Covid-19 pandemic created an opportunity for hackers to target the newly remote workforce. Hospitals have been targeted by ransomware (despite initial assurances to...
WooCommerce Sites Targeted by E-Skimming Attacks
Researchers at the cybersecurity firm Sucuri have uncovered a new set of e-skimming attacks targeting websites using the WordPress WooCommerce e-commerce plugin.
E-skimming attacks typically...
How to Pick the Right Cybersecurity Vendor for Your Business
Businesses across the country have had to adjust to their employees working from home. For many it was a last-minute scramble to adjust to what has become...
Beware Voice Deepfakes: Third Certainty #16
In the latest episode of Third Certainty, Adam Levin explains the danger of voice deepfakes.
How Marriott Customers Can Protect Themselves From The Latest Breach
Marriott International announced a data breach that may have exposed the information of 5.2 million guests. Among the information potentially compromised are names, birthdates,...
Worried About Your Remote Team’s Cybersecurity? Do These 5 Things Right...
The Covid-19 pandemic has sparked a mass exodus from offices around the world with millions of people now working from home. Hackers are already...
How to Protect Against Zoombombing
Video conferencing platform Zoom has been crowded with the spread of the Covid-19 pandemic and the adoption of social distancing measures.
Criminal cyber activity has...
Homographic Hacking: What It Is and How It Works
If you are moving fast as we tend to do during the workday, the following four web addresses may not look so different from...