Ransomware adopting self-replication

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

New security flaw in popular image uploader

New security flaw in popular image uploader

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely.

Different types of hackers defined

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of what resources need the most protection in your business.

How is BYOD a security risk?

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

How to find out if your computer has a virus

How to find out if your computer has a virus

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this from happening again? While there are various antivirus solutions you can take, it’s best to know how malware affects your computer first so you can quickly recognize and deal with the problem.

Imminent Danger

Imminent Danger

Are you actually paying someone to cause your downfall? Would you pay a criminal to break into your business?  Would you hire a corrupt bookkeeper you know nothing about and then give them full access to your bank accounts and credit cards?  Of course not!  Yet we constantly see something far more damaging.

Monitoring employees online. Is it right?

Monitoring employees online. Is it right?

Whether or not to monitor your employees’ computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process.

Cyber threats and the finance sector

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them.

WARNING AFTER INTIMATE PHOTOS SHARED PUBLICLY

WARNING AFTER INTIMATE PHOTOS SHARED PUBLICLY

The former girlfriend of George Zimmerman has shared her take on the sharing of very private information, for the first time on television. Her former boyfriend shared intimate photos of her on social media without her permission. Much of her time with Zimmerman was good until she started to get text messages and voicemails from total strangers.