2807, 2017

What you need to know about malware

By |July 28, 2017|Categories: Security|Tags: , , , , , , , |

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. [...]

2707, 2017

Old Mac malware gets a facelift

By |July 27, 2017|Categories: Apple|Tags: , , , , , |

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what [...]

2107, 2017

CopyCat on the prowl for Android

By |July 21, 2017|Categories: Android|Tags: , , , , , , |

New strains of malware are being developed every day. In fact, the number was nearly one million per day in 2015. With so many in existence, some have gone under the radar, as such is the case with CopyCat. So if you’re using any type of Android device, know that [...]

1307, 2017

Why Nyetya is more threatening than WannaCry

By |July 13, 2017|Categories: Security|Tags: , , , , , , |

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, [...]

2806, 2017

Why is Windows XP getting updates?

By |June 28, 2017|Categories: Windows|Tags: , , , , , , , , , , |

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, [...]

2006, 2017

Android mobile security threats today

By |June 20, 2017|Categories: Android|Tags: , , , , , |

As bring your own device policies becomes common practice for companies today, business owners must keep in mind the possible cyber security implications of deploying more devices connected to the company network. If your employees are using Android devices, here are the top five security threats they need to be [...]

2505, 2017

WannaCry: A historic cyberattack

By |May 25, 2017|Categories: Security|Tags: , , , , , , , , |

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the [...]

2405, 2017

Mac HandBreak downloads infected by Trojan

By |May 24, 2017|Categories: Apple|Tags: , , , , , , , |

macOS version of HandBrake, an open-source video transcoding software that converts multimedia files into various formats, was recently infected with a Trojan. According to HandBreak’s announcement, if you downloaded the app between May 2 (14:30 UTC) and May 6 (11:00 UTC), there’s a 50% chance that your system got infected. [...]

905, 2017

New malware threats on Mac computers

By |May 9, 2017|Categories: Apple|Tags: , , , , , |

No computer is safe from malware, not even Macs. Even though incidences of viruses and malware are rare for Apple computers, they can still occur with disastrous consequences. Based on one security software firm’s report, MacOS malware grew by 744% in 2016, but the number of attacks were still fewer [...]

2804, 2017

What is virtual “sandboxing”?

By |April 28, 2017|Categories: Virtualization|Tags: , , , , , |

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it’s worth learning about. What is sandboxing? Sandboxing is one of [...]

Go to Top