The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won’t be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of […]

Distributed spam distraction hides illegal activities

As annoying as spam email is, it’s usually pretty harmless. But hackers have been using a method called distributed spam distraction (DSD) where spam email is used to carry out illegal activities. Learn more about DSD and how you can safeguard your systems against it. What is DSD? DSD is a type of attack wherein […]

Keep healthcare data safe from hackers

The healthcare industry is shifting their data to cloud services to serve their patients better and improve accessibility. This puts personal health information (PHI) and personally identifiable information (PII) at risk of getting stolen by hackers. Healthcare security experts believe that data breaches aimed at medical facilities are becoming more frequent because of the high […]

4 types of hackers that may target SMBs

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection. Script Kiddies […]

Government agency finds way to unlock iPhones

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they’ve found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers. iPhone vulnerabilities leaked, is it true? […]

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, […]

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible […]