By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different. Ransomware review Ransomware […]
How did WannaCry spread so far?
Trojan infects macOS version of HandBrake
If you’ve downloaded the macOS version of HandBreak, a popular video transcoding program that converts multimedia files into different formats, checking your computer’s safety right now would be wise. Users who downloaded the program between May 2 and May 6 have a 50 percent chance of being infected with an Apple Trojan, based on an […]
Mac Malware finds a new way to attack
MacOS has a reputation for being one of the most secure operating systems. But in 2016, its susceptibility to malware grew by an astounding 744% according to one security report. Recently, a new strain of malware was found to infiltrate Macs by bypassing all of its security features. Despite having one of the highest price […]
Watch out for this Microsoft Word bug
Feature updates can come and go, but when Microsoft releases a security update, you need to install it as soon as possible. This is because hackers are constantly looking for software bugs to exploit, and in Microsoft’s case, cybercriminals have found a serious vulnerability in Word. The attack On April 10, cybersecurity firm Proofpoint discovered […]
Homographs: the newest trend in phishing
So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up. Read on to […]
Back up your mobile devices now
Mobile phones’ sizes and styles went through massive changes in the last few years. And as their looks and dimensions changed, so did their functions. With better capacity and bigger storage, mobile phones turned into veritable mini-computers that businesses were quick to adopt as a vital office tool. Naturally, hackers got the memo. With new […]
Check the list of free ransomware decryptors
We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands. The state of […]
Which type of firewall is right for you?
Software solutions are almost always more user-friendly than hardware solutions. There’s no need to worry about cabling, firmware, and power consumption. But when it comes to firewalls, a software solution just can’t measure up to its hardware counterpart. Make sure you have all the facts before deciding which is right for you. Software firewalls Calling […]
Is your Android smartphone a security risk?
Desktop and laptop users install security software updates and do everything they can to safeguard against cyber attacks. The same cannot be said of smartphone users. This is understandable because cyber threats on mobile phones are less visible… but that doesn’t mean they don’t happen. When you factor in smartphone users’ growing dependency on mobile […]
Fileless malware is back, are you at risk?
How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]