Petronella Blog Archive

Visit our New Blog

Blog Post

LA Hospital Held Ransom for Over $16,000

A California hospital recently paid a ransom of almost $17,000 in bitcoins after being hit with ransomware that took hospital operations back to a veritable stone age.

Read More

Tags: Ransomware

Blog Post

Ransomware in Microsoft Word

A new strain of ransomware has made its way into Microsoft Word documents. It's well-hidden and as of right now, undetectable by antivirus software.

Read More

Tags: Ransomware, Locky, Microsoft Word

Blog Post

Apple Stands Up to FBI

A US magistrate has ordered Apple to assist the FBI in unlocking an iPhone owned by a recent mass shooter, but Apple is defying the order.

Read More

Tags: Apple, FBI, iPhone

Blog Post

Tips for Keeping Healthcare Records Safe

We recently wrote about a huge increase in hackers targeting healthcare information and why they do it. With over 111 million victims, about a third of Americans have had their information stolen and don't even know it. So what can you do to try to keep your healthcare information safe?

Read More

Tags: Hack, Identity Theft, Password, Healthcare Information

Blog Post

Valentine's Day Scams

Did you know that about 50% of all cards bought for Valentine's Day are bought in the week before the holiday? Gift sales surge in that time as well, making Valentine's Day a busy time for procrastinators. Hackers know this and are always ready to take advantage of it.

Read More

Tags: Malware, Identity Theft, Valentine's Day

Blog Post

The Latest in ATM Skimming

Skimmers, hidden cameras and keyboard overlays set to capture credit card information are old news now. Credit card thieves are moving their methods away from the machine itself.

Read More

Tags: ATM Skimmer

Blog Post

Protecting Your Business from Identity Theft

Business are facing increased attention and attacks from identity thieves. Businesses that are not keeping up with the threats are more susceptible than the ones that are staying informed and taking action. Here are actions your business can take to protect your business from identity theft, fraud and cybercrime.

Read More

Tags: Malware, Hack, Cyber Security, Password, Credit Card Fraud, Cyberattack