Samantha Keller

December 3, 2019

Using public USB ports? Make sure to use a USB data blocker

No USB phone charger on hand? No problem! So many places these days come equipped with power charging stations ready for use, some actually have the […]
December 2, 2019

Hospitals Face Rise in Malware Attacks

Technology in the healthcare industry is exciting.  It’s also rapidly growing with new advancements constantly on the horizon. These advancements are also beginning to have more […]
November 25, 2019

Hacker Warns of Over Sharing on Social Media

Think you’re playing it safe online? You use secure passwords, have the latest security features and don’t click on red flag phishing emails. But according to […]
November 21, 2019

There is a global lack of cybersecurity workers, but the attacks continue to grow

A new study reported on by CNBC states there is an overwhelming need for IT and cybersecurity professionals in the technology industry. It’s around 4 million […]
November 20, 2019

New IOT Law in CA for 2020

IOT devices are everywhere–from the refrigerator to the fish tank, the thermostat and even the sprinklers. It goes without saying that the “Internet of Things” intertwines […]
November 11, 2019
TikTok

TikTok a National Security Threat?

Little kid music videos a national threat? According to the US Government, TikTok, the trending Chinese-owned social media app that tweens adore is under investigation as […]
November 8, 2019

Hotel Robots in Japan Hacked to Spy on Guests

If there happens to be a robot in your hotel room, no matter how seemingly innocent, you might want to make sure it’s spending the night […]
October 28, 2019
SMS

Beware of SMS Bank Fraud Scam

Watch out for a new social engineering phone scam! This scam is targeting bank customers through SMS or text messages. The cons pretend to be with […]
October 22, 2019
Amazon

Amazon Scam Alert

HackRead has discovered an insidious phishing scam that’s trying to trick Amazon customers into forking over their account credentials, personal information, and financial details. The phishing […]