703, 2018

The importance of HTTPS

By |March 7, 2018|Categories: Web & Cloud|Tags: , , , , , , , , , |

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely. HTTPS [...]

2707, 2017

Old Mac malware gets a facelift

By |July 27, 2017|Categories: Apple|Tags: , , , , , |

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what [...]

1906, 2017

Google adds anti-phishing features on Gmail

By |June 19, 2017|Categories: Google|Tags: , , , , , , , , , |

Cybercriminals have been relentless throughout 2017. In the past couple of months, hackers discovered new malware strains and software vulnerabilities that have overwhelmed thousands of businesses worldwide. But despite these new attacks, hackers still have an old, yet effective trick up their sleeves: phishing scams. To this day, sending fraudulent [...]

2505, 2017

WannaCry: A historic cyberattack

By |May 25, 2017|Categories: Security|Tags: , , , , , , , , |

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the [...]

1805, 2017

New phishing protection for Gmail on Android

By |May 18, 2017|Categories: Android|Tags: , , , , , , , , |

One of the most common ways hackers infiltrate networks is by using phishing scams -- fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method. To blunt the potency [...]

1005, 2017

The most advanced Gmail phishing scam yet

By |May 10, 2017|Categories: Security|Tags: , , , , , , |

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent. Read on to educate yourself on how to [...]

2604, 2017

Microsoft Word bug: What you need to know

By |April 26, 2017|Categories: Office|Tags: , , , , , , , , |

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. [...]

2404, 2017

The phishing craze that’s blindsiding users

By |April 24, 2017|Categories: Security|Tags: , , , , , |

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take [...]

710, 2016

Social engineering and cyber security

By |October 7, 2016|Categories: Security|Tags: , , , , |

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often [...]

Go to Top