Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.
Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software […]
The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from […]
Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.
You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.
Even if notable punishments and fines for HIPAA non-compliance have only been doled out over the last 6 years, data privacy regulations have been around for 14. And with each passing year, these rules evolve in ways that make it near impossible to keep up without an expert on hand.
Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber-security this level of diabolical blackmail represents a new and scary trend for hackers.