1512, 2016

Gooligan malware wreaks havoc on Android

By |December 15, 2016|Categories: Android|Tags: , , , , , , |

Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to [...]

1312, 2016

Predicting cyber-threats in 2017

By |December 13, 2016|Categories: Security|Tags: , , , , , , |

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it [...]

212, 2016

iPhone video bug crashes Apple devices

By |December 2, 2016|Categories: Apple|Tags: , , , , , |

Apple iOS users beware -- there’s a five-second video that can harm your iPhone. In late November, the brief MP4 clip seemed innocent enough. But after iPhone users played the video, their iPhones began to slow down and eventually crash. Details of the iPhone-killing bug are still being investigated, but [...]

2911, 2016

Potential security breach for Android users

By |November 29, 2016|Categories: Android|Tags: , , , , , , |

Android users may have reason for concern regarding their device security as well as the information transmitted by their phones. A backdoor security breach has recently been identified in Android devices that could cause user data to be sent to China. Because of the major risks that this security breach [...]

1711, 2016

Office 365 reveals new security features

By |November 17, 2016|Categories: Office|Tags: , , , , , , |

Office 365 has given business owners access to online organizational programs and collaboration tools for years. In an effort to become more user-friendly, Microsoft recently added new features to Office 365, including two security upgrades and the addition of productivity tracking. Keep reading to find out more about Office 365's [...]

2510, 2016

2 types of identity verification, explained

By |October 25, 2016|Categories: Security|Tags: , , , , |

Cyber security is becoming more and more important in an increasingly digital age. While many people and businesses know how important their online security is, they may not know what types of online security are best, nor the differences between the most commonly available options. There are two security authentication [...]

710, 2016

Social engineering and cyber security

By |October 7, 2016|Categories: Security|Tags: , , , , |

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often [...]

2109, 2016

9 essential cybersecurity phrases

By |September 21, 2016|Categories: Security|Tags: , , , , , , , |

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you’re looking for a list of the industry’s [...]

809, 2016

VMware releases security patches

By |September 8, 2016|Categories: Virtualization|Tags: , , , , , |

Sometimes technology solutions seem safer merely because they’re not widespread enough to be a lucrative target. Although increasingly popular, virtualization’s resilient protection protocols and low adoption rates tend to offset the cost vs. benefit considerations of creating an exploit. Or at least, that was the case. Late last month VMware [...]

509, 2016

Record $5.5 million HIPAA penalty doled out

By |September 5, 2016|Categories: Healthcare|Tags: , , , , , , |

If your organization hosts data regulated by the US government, you're familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires. Unfortunately, [...]

Go to Top