Phishing

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

WannaCry Ransomware: Is Your Business At Risk?

WannaCry Ransomware: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning. 

Why System Updates Are Important!

Why System Updates Are Important!

A MASSIVE RANSOMWARE attack spread across the globe early Friday morning, locking up thousands of hospital, telecommunications, and utilities systems in nearly 100 countries. The attack used data stolen from the NSA to exploit vulnerabilities in Microsoft Windows and deliver the WanaCrypt0r ransomware. The demand was for $300 per PC. 

How to Avoid Getting Spyware on Your Computer

How to Avoid Getting Spyware on Your Computer

Using spyware, hackers can record your keystrokes, take pictures of your desktop, read your emails, make copies of your files, and much more. Spyware is a type of malware that runs in the background, without your knowledge. It collects information about your activities on the computer, sending the data to hackers through your Internet connection.

How to prevent malware infection

How to prevent malware infection

Yes, it’s possible to clean up an infected computer and fully remove malware from your system. But the damage from some forms of malware, like ransomware, cannot be undone. If they’ve encrypted your files and you haven’t backed them up, the jig is up. So your best defense is to beat the bad guys at their own game.

5 Ways Your Employees Might Be Putting Your Business at Risk

5 Ways Your Employees Might Be Putting Your Business at Risk

Employees can be your most valuable asset — and your biggest security nightmare. Sometimes, they engage in risky behaviors without even realizing they are doing so. Taking work home, for example, might seem innocent enough, but it can put holes in your security defenses.

8 Signs Your Computer Might Be Infected with Malware

8 Signs Your Computer Might Be Infected with Malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them.

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

Why Malvertising Might Show Up on Your Favorite Website

Why Malvertising Might Show Up on Your Favorite Website

The notion that your computer might get a malware infection when you simply visit one of your favorite websites might be enough to give you nightmares. But it is a very real possibility. Cybercriminals are increasingly posting malicious advertising, or malvertising, on legitimate websites in order to spread malware.

How to Protect Your Business from Ransomware Attacks

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016.

9 Signs That an Email Might Be a Phishing Scam

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing scams, digital con-artists use a convincing pretense to lure you into performing an action — usually opening an attachment or clicking a link.

Ransomware spreads via removable drives

Ransomware spreads via removable drives

Zcryptor is a new type of ransomware that unlike it's predecessors exhibits worm-like behavior. This ransomware leverages removable and network drives to propagate itself and affect more users.

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Spear phishing con artists are becoming more clever and sophisticated in their attempts to trick people into falling for their scams. For instance, they now sometimes include the intended victims' home addresses to make their spear phishing emails seem more legitimate.

Tech Support Scam: Phishing for Personal Information over the Phone

Tech Support Scam: Phishing for Personal Information over the Phone

The tech support phone scam never seems to meet its demise. After one version runs its course, it is not long until a new variation is making the rounds. In this type of phishing attack, scammers claim that they have detected a problem on your computer and offer to fix it — for a fee, of course. Adding insult to injury, they often make your computer more vulnerable to future cyberattacks.