/
What Businesses Can Do To Minimize Phishing Emails

What Businesses Can Do To Minimize Phishing Emails

If you had to guess, worldwide, how many phishing emails would you estimate are sent out every day, what would you say? If you guessed anything less than three billion, you'd be incorrect. Three billion a day, on average. That's both terrifying and depressing. On...

read more
Tax Time Brings Out the Hackers

Tax Time Brings Out the Hackers

It's tax season once again! That, among other things, means that hackers and scammers are out in force, so beware! As in years past, the primary vehicle hackers and scammers use to run their various tax scams are phishing emails. They're usually designed to appear as...

read more
Study Shows Working From Home Could Be Here To Stay

Study Shows Working From Home Could Be Here To Stay

It goes without saying that the pandemic has changed a great many things about life, as well as the world we live and work in. One significant change on the work front has, of course, been the dramatic rise in the number of people working from home. We're reaching a...

read more
HTTPS Becomes Default For Google Chrome For Added Security

HTTPS Becomes Default For Google Chrome For Added Security

For the last month or so, Google has been testing the notion of using HTTPS as the default protocol for all URLs a user types into the address bar. Those who have been experimenting with Chrome's latest Canary build have already seen the new feature in action, and the...

read more
Now Hackers Are Attacking Exchange Server Vulnerabilities

Now Hackers Are Attacking Exchange Server Vulnerabilities

In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being exploited by a persistent threat group known as Halfnium, sponsored by...

read more
Mobile App Vulnerabilities Found To Leave Data Unsecured

Mobile App Vulnerabilities Found To Leave Data Unsecured

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That's good in theory, but based on new research from Zimperium, a disappointing percentage of app developers don't do nearly enough to secure the data they're housing...

read more
Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose not to encrypt files and demand payment or cause other...

read more
Microsoft Expanding Fight Against Macros Based Malware

Microsoft Expanding Fight Against Macros Based Malware

Macros have been a simple, effective means of spreading malware since the 1990's, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It's a long standing issue that many companies have attempted to address over the years. Now, it...

read more
Skip to content