Ransomware: It’s Getting a Lot of Publicity and What You Need to Do About It

Ransomware: It’s Getting a Lot of Publicity and What You Need to Do About It

Ransomware attacks are scary. Recently featured on 60 Minutes, ransomware is a huge threat to businesses. The story shows how attackers can come after any organization, featuring a hospital (just outside of Indianapolis) and two separate municipalities.

How to stay safe from Spectre & Meltdown

How to stay safe from Spectre & Meltdown

Like many security flaws, the Spectre and Meltdown bugs can leak critical data from computers and mobile devices for hackers to exploit. What makes them unique is the vast number of PCs, laptops, tablets, and smartphones they affect. But if you use an Apple device, there are fixes that can help you temporarily protect against […]

Strengthen your smartphone’s security

Strengthen your smartphone’s security

Hackers aren’t just trying to crack your desktop computers’ passwords, but also your mobile phones’. With cyber criminality running rampant nowadays, it’s become more critical to ensure the safety of all your devices. Let these security tips be your guide. Set a strong password Whether your device requires a 4-set or 6-set numerical PIN, a […]

Are the encrypted sites you visit safe?

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]

Is your laptop spying on you?

Is your laptop spying on you?

Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do is install a keylogger on one’s computing device. Let’s get to know more about keyloggers and how you can protect […]

Who & What Causes A Healthcare Breach

Who & What Causes A Healthcare Breach

Technology advancements have revolutionized the healthcare industry, but with security breaches hitting an all-time high and shattering records year after year, what and who do companies have to be wary about? Read on to find out. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records […]

KRACK patch on macOS High Sierra

KRACK patch on macOS High Sierra

Together with a new batch of emojis, the latest macOS update comes with security, stability, and reliability improvements. As usual, Apple recommends that Mac users update to macOS 10.13.1 High Sierra, and with good reason: It includes an essential patch to the recently discovered WiFi security vulnerability, KRACK. Why you should update now Foremost on […]

Get ready for the next wave of ransomware

Get ready for the next wave of ransomware

The WannaCry and Petya ransomware attacks were a huge wakeup call for healthcare organizations to update their security software. Unfortunately, hackers evolve at an incredible rate, and they’ve developed a new ‘Locky-like’ ransomware strain that can catch many in the healthcare industry off guard. Using old tricks The new ransomware strain, known as ‘IKARUSdilapidated,’ behaves […]

VoIP phishing: how scammers do it

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Know these types of malware to stay protected

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc. Here’s how different types of malware work and […]