504, 2019

Are Macs vulnerable to viruses?

By |April 5, 2019|Categories: Apple|Tags: , , , , , , , , , , , |

It is common knowledge that Windows computers tend to deal with an assortment of viruses and malware, but many people fail to realize that even Macs face similar threats. Virus creators have become adept at finding back doors and other vulnerabilities, that even Macs can be targeted. Viruses that affect [...]

2111, 2018

Protecting your Android mobile devices

By |November 21, 2018|Categories: Android|Tags: , , , , , , , , , , |

When personal and professional information live on one mobile device, a small breach can have huge impacts. As the adoption of bring your own device (BYOD) policies increase, employee awareness of cyberthreats becomes critical. Here are five tips for avoiding common Android-based security risks. Unsafe devices Sometimes, the device itself [...]

3110, 2018

Don’t be a VoIP eavesdropping victim

By |October 31, 2018|Categories: VoIP|Tags: , , , , , , , , |

In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping. Ensure that you [...]

307, 2017

Google ridding MR from search results

By |July 3, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual's medical records were [...]

2704, 2017

Five tips to prevent VoIP eavesdropping

By |April 27, 2017|Categories: VoIP|Tags: , , , , , , , , |

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had [...]

2702, 2017

Vulnerabilities on WordPress websites

By |February 27, 2017|Categories: Web & Cloud|Tags: , , , , , , , |

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to [...]

1312, 2016

Predicting cyber-threats in 2017

By |December 13, 2016|Categories: Security|Tags: , , , , , , |

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it [...]

2912, 2015

The curse of Chimera ransomware

By |December 29, 2015|Categories: Security|Tags: , , , , , , , , |

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it [...]

1812, 2015

Twitter warns about cyber attacks

By |December 18, 2015|Categories: Security|Tags: , , , , , , |

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook [...]

Go to Top