Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business. Viruses Once created to

By |2019-11-14T11:00:16+00:00July 28th, 2017|Security|

Beware the Mac malware stealing bank info

With a name like OSX.Dok, it’s hard to feel confident about staying ahead of the recent MacOS malware. The cryptic letters foreshadow countless pages of complicated code that most computer users don’t understand at all. Fortunately, avoiding this cyberattack doesn’t require any programming know-how whatsoever. OSX.Dok isn’t new, but it has been improved Originally, this

By |2019-11-14T11:00:25+00:00July 27th, 2017|Apple|

Android devices easy prey for CopyCat

There’s a reason malware makes the headlines on the internet almost every day: its impact on business has proved devastating. Nearly one million new strains of malware are being developed each day, which goes to show how popular of a weapon it is in a hacker’s arsenal. Unfortunately, even older malware can still wreak havoc on

By |2019-11-14T11:00:37+00:00July 21st, 2017|Android|

Beware: Nyetya is worse than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history. Like WannaCry, its attackers exploited unpatched Microsoft vulnerabilities and demanded a $300 ransom in Bitcoins.

By |2019-11-14T11:01:00+00:00July 13th, 2017|Security|

Windows XP receives security update

Support for Windows XP ended in April 8, 2014. This means that Microsoft has stopped providing updates, security patches, and technical assistance for XP users for over three years. But despite the end of support date, Microsoft has recently released a new security fix for the outdated operating system. Here’s why. More WannaCry copycats The

By |2019-11-14T11:03:26+00:00June 28th, 2017|Windows|

Protect your Android mobile devices

When personal and professional informational lives on one mobile device, the risk of malware attacks and huge data breaches rises. As the adoption of bring your own device policy increases, so should employee awareness when it comes to ever-growing cyber threats. To avoid falling victim, here are five Android security threats you need to be

By |2019-11-14T11:03:40+00:00June 20th, 2017|Android|

Lessons learned from the WannaCry malware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here. Ransomware review Ransomware is a specific type of malware

By |2019-11-14T11:06:07+00:00May 25th, 2017|Security|

Malware infects Mac HandBrake downloads

From May 2-6, a Trojan was attached to downloads of the macOS version of HandBreak, a free, cross-platform video transcoding software that processes multimedia files and other digital sources such as DVD and BluRay into .MP4 and .MKV files, and other formats. If you’re not sure whether your device has been infected, read on. How

By |2019-11-14T11:06:10+00:00May 24th, 2017|Apple|

Beware: new Mac malware on the loose

One of the defining characteristicsof Apple computers is their seemingly impenetrable security system. Business and individual consumers alike who value security most in an operating system choose Apple products. Will this still be the case now that malware attacks on MacOS are increasing -- 744% in 2016, according to reports? Read on to find out.

By |2019-11-14T11:08:05+00:00May 11th, 2017|Apple|

A brief history of virtual quarantines

Malware is becoming more sophisticated every day, and we recommend several solutions for dealing with it. One of the most interesting of these is achievable via cutting-edge virtualization technology. Often referred to as sandboxing, this solution is a great way to quarantine and test suspicious applications before exposing them to your entire network. What is

By |2019-11-14T11:08:40+00:00April 28th, 2017|Virtualization|