“Know thine enemy” — it means to get to know them and their motives. In this blog, we take a close look at the five types of dangerous hackers, what their motives are, and how they operate. Script kiddies In terms of skill, script kiddies (or skids, for short) are at the bottom of the […]
A lot of people get a handful of spam in their email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block spam. But if you receive tens of thousands of spam all at the same time, a huge chunk of your time and energy will […]
Ransomware attacks are scary. Recently featured on 60 Minutes, ransomware is a huge threat to businesses. The story shows how attackers can come after any organization, featuring a hospital (just outside of Indianapolis) and two separate municipalities.
Healthcare providers are vulnerable to cyberattacks because their industry is lucrative. People and even government institutions spend so much money on their medical bills, thanks to emerging markets and aging populations. Advances in technology have transformed paper medical records to digital files that can easily be stored and accessed, but can also easily be stolen […]
Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four different […]
Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization — driving growth, facilitating hiring, and guiding marketing — without a single thought given to the security of the computer networks these processes depend on.
Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement. iPhone vulnerabilities leaked, is it true? A couple […]
Though we’re in the midst of an unprecedented rise in high-profile cybercrime incidents, it’s easy to assume that our own much smaller businesses are safe. Sure, we think, hacking into the data stores of J.P. Morgan, the U.S. Government, or Virgin America can net hackers millions and millions of dollars.
Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time. But being able to […]
The worrisome rise of ransomware doesn’t seem to be slowing as Microsoft recently announced the detection of self-propagating iterations of the malware. With this evolution, it is essential for SMBs to update their understanding of this security threat in order to properly protect themselves. Keep reading to learn how ransomware is continuing to extend its […]