2308, 2018

4 Security risks of the BYOD strategy

By |August 23, 2018|Categories: Security|Tags: , , , , , , |

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to [...]

3107, 2018

Top 4 benefits of web monitoring

By |July 31, 2018|Categories: Business|Tags: , , , , , , |

Although the occasional three-minute YouTube video never hurts anyone, wasting hours of your working day on these websites reduces productivity. When it comes to increasing employee productivity, keeping a close eye on their internet behavior reaps various benefits. Time-saving measures Internet monitoring software saves employees from visiting entertainment, gaming, or [...]

2006, 2018

Router malware worse than experts realize

By |June 20, 2018|Categories: Security|Tags: , , , , , , , , |

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter [...]

1506, 2018

Hide & Seek: New IoT malware to watch out for

By |June 15, 2018|Categories: Business|Tags: , , , , , |

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? [...]

106, 2018

Malware hits 500k IoT devices, Talos reports

By |June 1, 2018|Categories: Security|Tags: , , , , , , , , |

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine. How VPNFilter Works Talos cited the vulnerable devices [...]

2602, 2018

Tech support scam alarms Chrome users

By |February 26, 2018|Categories: Security|Tags: , , , , , , , , , , |

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach. The [...]

2202, 2018

Are hackers using your PC to mine Bitcoin?

By |February 22, 2018|Categories: Hardware|Tags: , , , , , , , , |

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your [...]

709, 2017

Ransomware is coming to your Android

By |September 7, 2017|Categories: Android|Tags: , , , , , , |

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like [...]

3008, 2017

New Locky ransomware: what you need to know

By |August 30, 2017|Categories: Security|Tags: , , , , , |

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of [...]

2908, 2017

Spyware has been infecting Macs for years

By |August 29, 2017|Categories: Apple|Tags: , , , , , , |

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the [...]

Go to Top