Tags » Malware

Lock Down Your Login

Last week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. 326 more words


Microsoft takes security to the next level!!

With many cyber attacks now initiated through the browser, endpoint security is something all businesses need to take seriously.

Among today’s announcements at Ignite, Microsoft trailed security enhancements across a range of its products, including the Edge browser. 319 more words


FedEx warning of fraudulent email scam

(WAVY) — FedEx has issued a warning that they have received reports from customers who have been sent fraudulent emails.

The emails reportedly have the subject lines “Shipping Conformation,” “Verify Info,” “Some important information is missing” and “Please fulfill the documents attached to verify your identity.” 44 more words


Seeking Treachery in a Questionably Sourced Phone

Have you ever considered sourcing an off-brand phone from the China markets? Why, or what stopped you? The answer is data and identity. You are trusting both when you decide to use a smartphone. 268 more words

Security Hacks

Live Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

Ransomware is the number one threat to an organization’s data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. 168 more words


8 years of Android: malware, malicious apps, and how to stay safe

At eight years old, Android is hugely popular. Both with users and attackers

Happy Birthday Android! It has been eight years since the Android project was officially released and introduced to the public – on September 23rd 2008 to be exact. 713 more words

Security News

Know the different types of viruses

A virus is a software that replicates itself and spreads into a device to damage or delete files. Viruses can usually enter a device via attached images, greetings, audio/video files, downloads, etc. 295 more words