Back in 2017, Equifax, one of the three major credit bureaus in the US, made a major security blunder that leaked millions of sensitive information, including Social Security numbers, addresses, driver’s license numbers, and credit card details. The company estimated that the data of 145.5 million people (almost half the US population) were exposed. But […]
Millions more affected by Equifax leaks
New scam freezes Chrome to panic users
Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen. The End Game The scam works by displaying an error […]
Inclusions of Google’s New Chrome Updates
Business owners must stay current with never-ending Google updates to keep their clients happy. For the month of February, Google heard users’ demands and decided to include three new features to Chrome to address users’ problems with ads. Ad Blocking Android users will be pleased to hear that the newly updated Google Chrome comes with […]
Beware of the Meltdown and Spectre patches
Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]
Is your laptop spying on you?
Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do is install a keylogger on one’s computing device. Let’s get to know more about keyloggers and how you can protect […]
Beware of sneaky Microsoft Office malware
Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office. What’s the new Office threat? […]
Equifax’s Leak: lessons learned
No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]
Beware of a new Locky-type ransomware
Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of […]
Tips and tricks for avoiding IoT threats
Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks. Set passwords […]
Quick review: why you need virtualization
With virtualization, you can make software see several separate computers where there is only one, or make several computers look like one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few. More technology uptime Virtualization vendors use lots of fancy names […]