Blog

Security For The Internet of Things (IoT)
Security
Split Tunnel SMTP Exploit Explained
- Published: May 23, 2017 Security Research By: Vikas Singla & Jason Morris   Executive Summary:   Exploit: The Split Tunnel SMTP Exploit allows an attacker to bypass an organization's email security gateway and inject messages with malicious payloads directly into the victim's em...
Security
WannaCry Payment Deadline...
An update on the WannaCry Ransomware from the NY Times. With the clock ticking on whether a global hacking attack would...
Security
NY Hospital Hacked- 7,000...
Here is the latest on the Bronx Lebanon Hospital Cyberattack from NBC News. Medical records of at least 7,000 people co...
Security
The Internet of Insecure...
Frost & Sullivan highlights five IoT growth areas for 2017 It’s May already, and analysts have begun thinking ahe...
Security
Healthcare Records Sellin...
A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them for sale...
Security
7 IoT Predictions for 201...
Here are some interesting predictions from TechTarget. Their premise- "If 2016 was the year that the world got to know t...
Security
IBM dissects 2016 Cyber A...
IBM's 2016 X-Force Threats Intelligence Index was just released. The stats are amazing. Several major data breaches t...
Security
Hospitals need Increased...
Lying in a hospital bed, the last thing you should have to worry about is a personal data breach. Yet recent research co...
Security
New Mexico- 48th State To...
New Mexico is the latest state to enact a statute that requires that their residents be notified when there has been una...
Security
The Cloud and IT Security...
JOIN Securolytic's CEO Sanket Patel at this important and unique TAG CLOUD event on Tuesday March 28th to discuss "The E...
Security
Russians Behind Yahoo Bre...
On February 7, 2017 , the team at Securolytics reported on the massive Yahoo breach which affected 500 million of their...
Security
Securolytics Web Security...
Securolytics Web Security detects attempted communication by VoluumTrk Mobile Adware. We thought it would be useful to p...
Security
Atlanta Hospital Attacked...
Excellent reporting from Modern Healthcare and Health Data Management help us to understand what happened at Emory Healt...
Security
Must-Know Healthcare Cybe...
Are you satisfied with your IT Security? The experts at Securolytics are working everyday to counter and defeat Healthca...
Security
Atlanta Based Arby's Ackn...
Fast Food Chain Arby’s credit card users attacked Sources at nearly a half-dozen banks and credit unions independ...
Security
The State of IoT Security...
The team at Securolytics is excited to present the second of our blog series on IoT Security.  Check out the numbers- i...
Security
Spam is making a big-time...
This Network World article is a fantastic reminder that our emails are still BIG targets for cybercrime. All organizatio...
Security
25% of Companies Breached...
Securolytics is always on the look out for important and current surveys/reports on the state of IT Security. We want ou...
Security
Flashpoint's "Business Ri...
In Dark Reading, a look at Flashpoint's first "Business Risk Intelligence Decision Report." In 2017, IoT is a major conc...
Security
Georgia Tech Lands $17.3-...
Our congrats to Georgia Tech. Last month, Georgia Tech was granted a $17.3 million cybersecurity research contract by th...
Security
Healthcare Under Cyber-As...
Securolytics is working with the Healthcare Industry to proactively defeat CyberCrime. This excellent article looks at t...
Newsroom
Leading Age NY Interviews...
According to the FBI, “ransomware attacks are not only proliferating, they’re becoming more sophisticated.” (www.f...
Security
Healthcare IoT Is A Chris...
Securolytics is working with the Healthcare Industry to proactively defeat CyberCrime. This excellent article looks at t...
Newsroom
Interview: Sanket Patel &...
Sanket Patel our CEO was just interviewed in Adviser- Leading Age New York. Please check it out! Discussion with Davi...
Security
2016's Biggest Data Breac...
Securolytics is in the forefront of proactively detecting and disarming hackers and identity theft in businesses large a...
Security
Healthcare Top Target for...
Experian's 2017 prediction report is sobering. At Securolytics, we are in the forefront of proactively protecting Health...
Security
Securolytics Eliminates P...
Securolytics Web Security detects attempted communication by PCKeeper software and related toolbars.  We thought it wou...
Security
Securolytics Eliminates M...
Securolytics Web Security detects attempted communication by MacKeeper software and related toolbars.  We thought it wo...
Security
Forrester Predicts Massiv...
Last week, Forrester, one of the world’s most influential research and advisory firms, released its "Predictions 2017:...
Security
Anthem 2015 Data Breach U...
The team at Securolytics is diligently monitoring and analyzing the trends and news surrounding Healthcare industry cybe...
Security
Securolytics Eliminates M...
Securolytics Web Security detects attempted communication by the Mindspark family of adware and toolbars.  We thought i...
Newsroom
Zoho Partners with Securo...
With our technological expertise and heavy use of API, it makes sense that Zoho chose Securolytics to be a strategic par...
Newsroom
Dark Reading Quotes Secur...
Last week’s massive DDoS' denial of service attack took down a good portion of the Internet, using webcams and DVRs. T...
Security
Ransomware Targeting US C...
According to the US Department of Homeland Security, “the infections of ransomware, which encrypts critical data and d...
Security
IoT's Rough Patch
According to a survey by PricewaterhouseCoopers, almost 70% of connected IoT devices lack fundamental security. Accordin...
Security
Is Your Network Safe From...
The second in Securolytics IoT Security Blog Series According to a survey by PricewaterhouseCoopers, almost 70% of co...
Security
The State of IoT Security
The team at Securolytics is excited to present the first of our blog series on IoT Security. There is no Technology S...
Newsroom
Securolytics @ CyberLaunc...
Securolytics was proud to be part of CyberLaunch’s  ‘Demo Day,’ this Thursday at the Atlanta Tech Village. We wer...
Trending Searches
NXDOMAIN
NXDOMAIN is the return code when a DNS lookup fails to resolve the requested domain to an IP address. This can happen f...
Trending Searches
ransomware
There is a new kind of ransomware floating around on the internet and it's nasty.   The ransomware detected e...
Newsroom
CyberLaunch Selects Secur...
CyberLaunch, the leading accelerator for information security and machine learning startups, announced its inaugural ‘...
Security
Healthcare’s Top 10 Ema...
In 2015, the healthcare industry was responsible for 66.7% of the 170-million records compromised in the United States t...
Security
Google Discovers 800,000...
Google has just released a report that in 2015 an estimated 800,000 sites were infected with drive-by download malware a...
Security
WSJ reports on 2016 Data...
The latest count from the Identity Theft Resource Center (ITRC) reports that there have been 227 data breaches recorded...
Security
The Newest Malware- Bewar...
Cyber attackers have gone back to the basics with the release of a new strain of ransomware malware that locks up compro...
Security
Email Security- The Human...
We can all attest that the sheer volume of emails we are sending and receiving every day is exploding. Now we have some...
Security
Hollywood Presbyterian Ho...
Hollywood Presbyterian Hospital is an old and respected medical center deep in the heart of Hollywood. Its stucco buildi...