How to Spot a Phishing Attack

How to Spot A Phishing Attack Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in […]

Phishing 101

Phishing 101 While the number of people sending personal information to the crown prince of Nigeria in hopes of receiving wealth and riches seems to be dropping, phishing still remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% last year. What exactly is phishing? Hackers […]

Investigation Reveals Shocking New Evidence About Avast’s Data Collection Scheme

Recently, a joint investigation by PCMag and Motherboard revealed something deeply concerning about Avast, a free antivirus used by hundreds of millions of people. A report released on Monday revealed that the company has been selling sensitive browsing data to several large corporations. The report cites company documents, leaked user data, and contracts to expose […]

Breaches – Are you on a Hackers Watchlist?

Since 2010, billions of people have had their data stolen from one or more business sectors. The field of technology is constantly expanding, and with new technology comes new ways of breaching seemingly secure data. As technology advances, people tend to forget about outdated technology and grow less concerned about security. It’s critical to ensure […]

Heritage Company Fires 300 Employees Following Ransomware Attack

This is not the news anyone wants to hear. Just before Christmas, the CEO of The Heritage Company had to tell his 300 employees some really bad news – they were fired. Why? They had been hit by ransomware and they didn’t know when / if they would be operational again. This is why it […]

Mischievous Malware – Part 2 – Malvertising

We are continuing our discussion from yesterday about mischievous malware. Now that you are a bit familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam. Malvertising. This has been gaining headway on Google, so much so, they created an individual landing page asking consumers […]

Mischievous Malware – Part 1

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of mischievous malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal […]

Social Engineering – Part 2 – Internal Threats

Yesterday, we started looking at Social Engineering. Today, we will look at some internal threats and more… Internal Threats Originally, social engineering took place in a physical setting. A hacker would do some preliminary research on a company structure or focus on behaviors in order to get that initial access into a building, server room […]

Social Engineering – Part 1 – Fancy Job Title for Hacker

What on earth is Social Engineering? Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into […]

What is ransomware, and how can you protect your business against it?

Imagine this. It’s 6am on Monday morning and you walk into your office, ready for another week of work. You sit down at your computer to check your email, but you suddenly realize that something is wrong. You can’t access anything, and your computer appears to have been locked down while you were out of […]