Protecting your Android mobile devices

When personal and professional information live on one mobile device, a small breach can have huge impacts. As the adoption of bring your own device (BYOD) policies increase, employee awareness of cyberthreats becomes critical. Here are five tips for avoiding common Android-based security risks. Unsafe devices Sometimes, the device itself might not be safe due […]

3 ways to browse the net safely at work

Amidst the current climate of malware, hacks, and phishing scams, the internet really isn’t safe for any company that doesn’t take precautions. Without safeguards, browsers that you or your employees use are vulnerable to cyber attacks that may cripple productivity and profit. There are wise steps that every company should take to browse the net […]

Malware threats for Android phones

Smartphones are like palm-sized computers, and they deserve the same protection as desktops and laptops. While you don’t need to install bulky security software to protect against cyberthreats, there are steps you can take to keep cybercriminals at bay. Mobile malware MO Mobile malware can be as harmful to a business’s network as infected desktops […]

4 Security risks of the BYOD strategy

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks. Here […]

Top 4 benefits of web monitoring

Although the occasional three-minute YouTube video never hurts anyone, wasting hours of your working day on these websites reduces productivity. When it comes to increasing employee productivity, keeping a close eye on their internet behavior reaps various benefits. Time-saving measures Internet monitoring software saves employees from visiting entertainment, gaming, or online shopping sites by restricting […]

Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security […]

Hide & Seek: New IoT malware to watch out for

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? The Hide and Seek (HNS) […]

Malware hits 500k IoT devices, Talos reports

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and […]

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach. The End Game The scam works […]

Are hackers using your PC to mine Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to calculate complex mathematical […]

Ransomware is coming to your Android

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware […]

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. Quick facts According to […]

Spyware has been infecting Macs for years

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers. […]

What you need to know about malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy […]

Old Mac malware gets a facelift

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what you can do to prevent […]

CopyCat on the prowl for Android

New strains of malware are being developed every day. In fact, the number was nearly one million per day in 2015. With so many in existence, some have gone under the radar, as such is the case with CopyCat. So if you’re using any type of Android device, know that CopyCat likes to use its […]

Why Nyetya is more threatening than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

Android mobile security threats today

As bring your own device policies becomes common practice for companies today, business owners must keep in mind the possible cyber security implications of deploying more devices connected to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as […]

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review […]

Mac HandBreak downloads infected by Trojan

macOS version of HandBrake, an open-source video transcoding software that converts multimedia files into various formats, was recently infected with a Trojan. According to HandBreak’s announcement, if you downloaded the app between May 2 (14:30 UTC) and May 6 (11:00 UTC), there’s a 50% chance that your system got infected. Read on to find out […]