Posts Tagged ‘cyber security’

5 Cybersecurity measures anyone can master

5 Cybersecurity measures anyone can master

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one of those people, here are […]

Read more

MEGA Chrome Extension Hijacked to Steal Users’ Passwords

MEGA Chrome Extension Hijacked to Steal Users' Passwords

Warning! If you are using Chrome browser extension from the MEGA file storage service, uninstall it right now. The official Chrome extension for the MEGA.nz cloud storage service had been compromised and replaced with a malicious version that can steal users’ credentials for popular websites like Amazon, Microsoft, Github, and Google, as well as private […]

Read more

Regularly evaluate your cybersecurity

Regularly evaluate your cybersecurity

Experts estimate that the global market for cybersecurity products this year will exceed that of last year. At first glance, an increase in spending seems necessary and shows that businesses are becoming more aware of cybersecurity issues. But a closer look may prove otherwise. Learn why your company could be investing on cybersecurity products the […]

Read more

Spectre & Meltdown safety for Apple devices

Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways […]

Read more

Steps to safeguard your mobile devices

Mobile phones are just as prone to cyber attacks as desktop PCs, and cyber scammers are relying on unsecured devices to carry out their deeds. If you haven’t implemented a cyber security guideline for your company’s mobile devices, you can start by following these easy steps. Set a strong password Whether your device requires a […]

Read more

Phishing alert: scammers now use encryption

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According […]

Read more

HP laptop users beware: keylogger found

You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed. But for HP laptop users, chances are they aren’t […]

Read more

Apple releases KRACK patch in latest OS

Almost every macOS update comes with a security patch that users often dismiss. If you’ve read about KRACK, then you should know that updating your Mac’s operating system to macOS 10.13.1 High Sierra is extremely important. Here’s everything you need to know about Apple’s latest Mac OS. Why you should update now Foremost on Apple’s […]

Read more

Scammers are creating new scams just for VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. Naturally, shrewd scammers have found a way to use VoIP as a means to carry out ‘vishing scams,’ a new type of phishing whereby fraudsters make phone calls, pose as a business or financial partner, and request private details. Understanding these scams well is […]

Read more

Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business. Viruses Once created to […]

Read more