When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes.
Phishers use encrypted sites to scam
A keylogger found in HP laptops
You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed.
What you need to know about malware
Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.
Why Nyetya is more threatening than WannaCry
The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.
Firmware: the threat most users overlook
As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack.
Are your printers safe?
Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices.
Ransomware demands more victims for freedom
Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need.
IT security predictions for 2016
As shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers.