709, 2017

Ransomware is coming to your Android

By |September 7, 2017|Categories: Android|Tags: , , , , , , |

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like [...]

1608, 2017

Black and white: Not all hackers are bad

By |August 16, 2017|Categories: Security|Tags: , , , , , |

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference [...]

908, 2017

Tips for keeping your mobile devices safe

By |August 9, 2017|Categories: Hardware|Tags: , , , , , |

Businesses are using mobile devices more than ever to increase productivity and profitability. However, like desktops and laptops, smartphones and tablets are highly vulnerable to hacking, and some employees expose them to threats in ways they may not even be aware of. To protect your company from these threats, follow [...]

2707, 2017

Old Mac malware gets a facelift

By |July 27, 2017|Categories: Apple|Tags: , , , , , |

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what [...]

2806, 2017

Why is Windows XP getting updates?

By |June 28, 2017|Categories: Windows|Tags: , , , , , , , , , , |

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, [...]

3105, 2017

NSA-approved: mobile virtualization

By |May 31, 2017|Categories: Virtualization|Tags: , , , , |

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security. Here’s what you need to know: US government [...]

2505, 2017

WannaCry: A historic cyberattack

By |May 25, 2017|Categories: Security|Tags: , , , , , , , , |

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the [...]

2205, 2017

Web browser cybersecurity, ranked

By |May 22, 2017|Categories: Web & Cloud|Tags: , , , , , , , |

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start. Learn more about how your browser choice stacks [...]

1105, 2017

Predictability coming to Windows 10 updates

By |May 11, 2017|Categories: Windows|Tags: , , , , , , |

Updates to the Windows operating system have a controversial reputation. On the one hand, Microsoft issues them frequently to combat cybersecurity risks and introduce new features. On the other hand, the update frequency and requirements leave some users feeling like it's impossible to keep up. The most recent announcement from [...]

1005, 2017

The most advanced Gmail phishing scam yet

By |May 10, 2017|Categories: Security|Tags: , , , , , , |

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent. Read on to educate yourself on how to [...]

Go to Top