Spectre & Meltdown: how to protect yourself

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep […]

Tips to protect your smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set […]

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software […]

Key points from Protenus’ new report!

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light […]

Essential macOS High Sierra updates

The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from […]

Watch out! More ransomware attacks incoming

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks. Using old tricks The new ransomware strain, […]

How to protect your VoIP system from phishing

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call. Your business will be well-served by guarding itself from […]

What you need to know about malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy […]

Why Nyetya is more threatening than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

Firmware: the threat most users overlook

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy — and that’s totally incorrect. Read on to learn more […]

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed […]

3 Reminders for HIPAA compliance in 2017

Even if notable punishments and fines for HIPAA non-compliance have only been doled out over the last 6 years, data privacy regulations have been around for 14. And with each passing year, these rules evolve in ways that make it near impossible to keep up without an expert on hand. As we kick off 2017, […]

Ransomware demands more victims for freedom

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn […]