You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide. What is it? Little is known about the adware itself or those behind it, but […]
Social engineering exploits Facebook
Reduce your printing costs with these 5 tips
Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget.
Ransomware targets Android devices
By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims’ data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims.
Get ready for the next wave of ransomware
The WannaCry and Petya ransomware attacks were a huge wakeup call for healthcare organizations to update their security software. Unfortunately, hackers evolve at an incredible rate, and they’ve developed a new ‘Locky-like’ ransomware strain that can catch many in the healthcare industry off guard.
Take better notes with Microsoft’s OneNote
Microsoft Word, PowerPoint and Excel form the foundation of most Office experiences. But there’s another application that doesn’t get its fair share of attention: OneNote. It’s severely underutilized considering how helpful it is, so we’re going to explain some of the basics.
Microsoft released security updates for all versions of Windows
Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of […]
Beware of a new Locky-type ransomware
Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.
Fruitfly spyware targets Mac computers
Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.
What is Amazon AppStream 2.0?
Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever.