Office 365 users face new phishing scam

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time[...]

keep Reading

Locky-type ransomware is attacking systems

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since [...]

keep Reading

It’s time to redefine the word “hacker”

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in ha[...]

keep Reading

Steer clear from these types of malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin y[...]

keep Reading

Beware: Nyetya is worse than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber atta[...]

keep Reading

Worrying evidence of poor router security

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers[...]

keep Reading

PC fixes are a drain on your company’s budget

When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of e[...]

keep Reading

Lessons learned from the WannaCry malware

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or [...]

keep Reading

This fake Google app is really a phishing scam

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do [...]

keep Reading

Sly phishing attack catching users off guard

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing alm[...]

keep Reading