Malware

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

WannaCry Ransomware: Is Your Business At Risk?

WannaCry Ransomware: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning. 

Why System Updates Are Important!

Why System Updates Are Important!

A MASSIVE RANSOMWARE attack spread across the globe early Friday morning, locking up thousands of hospital, telecommunications, and utilities systems in nearly 100 countries. The attack used data stolen from the NSA to exploit vulnerabilities in Microsoft Windows and deliver the WanaCrypt0r ransomware. The demand was for $300 per PC. 

Windows Vista End-of-Life: What This Means For You

Windows Vista End-of-Life: What This Means For You

The countdown is on for Windows Vista users. On 11th April 2017, Microsoft will cease all support and security patching, just like they did with previous Windows versions.  Naturally, you’re rather attached to your current operating system and not exactly leaping for joy at this news!

Spring Clean your PC, Remove & Prevent Malware

Spring Clean your PC, Remove & Prevent Malware

Cyber criminals frequently and automatically scan websites and PCs with different types of malware, to see if there are vulnerabilities they can use to gain entry to your system. Outdated programs provide these cyber criminals with an easy path to your computer.

How to stay safe and secure online in 2017

How to stay safe and secure online in 2017

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors around the world.

Your Webcam Might Be Spying on You

Your Webcam Might Be Spying on You

Spying on people through their computers' webcams might sound like a trick you would see in a James Bond movie, but it is a real threat in this digital age. Hackers, government agencies, and even a U.S. school district have been caught doing it.

4 IT Trends That Will Affect Businesses in 2017

4 IT Trends That Will Affect Businesses in 2017

There is no crystal ball that businesses can use to see the exact IT problems and opportunities that they will encounter each year. However, by looking at past and present IT trends, they can get a sense of where IT is heading and how the new direction might affect their business.

How to Avoid Getting Spyware on Your Computer

How to Avoid Getting Spyware on Your Computer

Using spyware, hackers can record your keystrokes, take pictures of your desktop, read your emails, make copies of your files, and much more. Spyware is a type of malware that runs in the background, without your knowledge. It collects information about your activities on the computer, sending the data to hackers through your Internet connection.

How Cookies Are Being Used to Track and Attack You

How Cookies Are Being Used to Track and Attack You

In this context, the term cookies refers to small data files that contain strings of text. When you connect to a website, its web server sends a cookie to your web browser. The browser will send the cookie back to the server whenever you visit that website again.

How to prevent malware infection

How to prevent malware infection

Yes, it’s possible to clean up an infected computer and fully remove malware from your system. But the damage from some forms of malware, like ransomware, cannot be undone. If they’ve encrypted your files and you haven’t backed them up, the jig is up. So your best defense is to beat the bad guys at their own game.

Cybercriminals Now Using Legitimate PayPal Emails in Scam

Cybercriminals Now Using Legitimate PayPal Emails in Scam

PayPal scams are nothing new. What is new is that cybercriminals have started using legitimate PayPal services to perpetrate those cyberattacks. In July 2016, cybercriminals sent legitimate PayPal emails to PayPal members in an effort to scam them out of $100 USD as well as infect their computers with malware.

8 Signs Your Computer Might Be Infected with Malware

8 Signs Your Computer Might Be Infected with Malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them.

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

Why Malvertising Might Show Up on Your Favorite Website

Why Malvertising Might Show Up on Your Favorite Website

The notion that your computer might get a malware infection when you simply visit one of your favorite websites might be enough to give you nightmares. But it is a very real possibility. Cybercriminals are increasingly posting malicious advertising, or malvertising, on legitimate websites in order to spread malware.

How to Protect Your Business from Ransomware Attacks

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016.

9 Signs That an Email Might Be a Phishing Scam

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing scams, digital con-artists use a convincing pretense to lure you into performing an action — usually opening an attachment or clicking a link.

Ransomware spreads via removable drives

Ransomware spreads via removable drives

Zcryptor is a new type of ransomware that unlike it's predecessors exhibits worm-like behavior. This ransomware leverages removable and network drives to propagate itself and affect more users.

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Spear phishing con artists are becoming more clever and sophisticated in their attempts to trick people into falling for their scams. For instance, they now sometimes include the intended victims' home addresses to make their spear phishing emails seem more legitimate.

How to Protect Your Business from the Locky Ransomware

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses' files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine.  In 2016 there have been over 40 new families of crypto ransomware discovered.