A destructive, new malware has surfaced in at least 500,000 home and business routers across 54 countries. Security researchers warned that the infected devices could “self-destruct” as the said malware named VPNFilter can maintain presence even after a successful reboot. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking […]
During the previous quarter, fake Chrome notifications urging users to dial a tech support number have grown dramatically. Research reveals that this tech support scam could possibly use an Application Programming Interface (API) to freeze the browser, convincing the user to get in touch with the support line and share their credit card details. The […]
There’s a new cyberattack in town, and it’s out to get your Bitcoins. Cryptojacking has grown in popularity over the past few months mainly because of the increasing value of cryptocurrency. So if you notice your computer slowing down, hackers may already be using your hardware to make easy money. Hijacked hardware Cryptojacking secretly uses […]
Without making too much of the analogy to seagoing vessels, overseeing your company’s armada of iPads and Androids is somewhat like managing a fleet of ships. In the case of the US Navy, for example, there are over 400 carriers, cruisers, subs, and destroyers spread out all over the world.
You are probably familiar with desktop-based ransomware like Petya, WannaCry, CryptoWall, and CryptoLocker. But mobile ransomware is an emerging trend you don’t want to learn about only after it strikes. Take a minute to read our summary of mobile ransomware and some easy prevention tips. How does ransomware make it onto your Android device? Like […]
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started […]
When new malware surfaces, many people often assume that it’s designed to attack Windows computers. However, Mac malware has been growing in popularity. Earlier this year, security researchers unearthed a new strain of spyware that may have been silently monitoring Mac computers for years. Fruitfly spyware The spyware, known as Fruitfly, was first discovered in […]
Businesses should be wary not just of cybercriminals, but also of the websites employees visit. The solution isn’t to go offline, but to choose the right network security software. If we are able to apply filters to drinking water and selfies, why can’t we have one for the web?
Web filters analyze both the origin and content of a webpage against a set of rules established by the user.
Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business. Viruses Once created to […]
With a name like OSX.Dok, it’s hard to feel confident about staying ahead of the recent MacOS malware. The cryptic letters foreshadow countless pages of complicated code that most computer users don’t understand at all. Fortunately, avoiding this cyberattack doesn’t require any programming know-how whatsoever. OSX.Dok isn’t new, but it has been improved Originally, this […]