The Hidden Dangers Of “Shadow IT” To Your Business
We all know that using information technology — programs, apps, or internet browsing — carries a certain amount of cybersecurity risk. Nobody wants to have their secure data compromised, but […]
New Android Malware Wreaks Havoc For Some Users
There’s a nasty new strain of malware you need to be aware of that targets Android devices. Don’t let the funny name fool you because AbstractEmu is a serious threat. […]
Hackers Turn To New Trick Called SEO Poisoning
Hackers have a new tool in their toolbox you should be aware of called SEO Poisoning or sometimes “search poisoning”; the attack relies on Black Hat SEO techniques to optimize web […]
New TodayZoo Phishing Campaign Is Going After Passwords
Microsoft recently reported on the existence of an unusual phishing campaign designed primarily to harvest the passwords of unsuspecting victims. One of the things that makes the campaign so unusual […]
This Mac Malware Should Have Users Worried
Researchers from Microsoft have reported the discovery of a new variant of macOS malware called WizardUpdate. The new version should worry all Mac users because it has been upgraded to […]
Criminals Are Using YouTube Video Channels To Spread Malware
YouTube has long been a hunting ground used by hackers and scammers to push all manner of hoaxes, scams and malicious code onto unsuspecting users. A security researcher known only […]
Warn Your Employees About The New DocuSign Phishing Campaign
Phishing attacks tend to focus on executive level targets. They focus on high ranking targets who have considerable system access. That appears to be changing. A recent trend tracked by […]
Twitch Hack Was Much Bigger Than Expected
Are you a gamer or do you broadcast on Twitch for some other reason? If so be aware that the platform was recently hacked and the amount of information the […]
The right information can protect your firm
Cybersecurity criminals Confess: The Top 5 Tricks, Sneaky Schemes And Gimmicks They Use To Hack Your Computer Network The contemporary world is rife with digital thieves. They’re penetrating the complicated […]

