By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.
How did WannaCry spread so far?
Trojan infects macOS version of HandBrake
If you’ve downloaded the macOS version of HandBreak, a popular video transcoding program that converts multimedia files into different formats, checking your computer’s safety right now would be wise. Users who downloaded the program between May 2 and May 6 have a 50 percent chance of being infected with an Apple Trojan, based on an […]
Protect your data from WannaCry
This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the ransom. What’s more alarming, however, is that the global success of this malware will likely spawn even more potent variants.
How good is your web browser’s security?
Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start.
Server management: 4 essentials
By their very definition, servers are tasked with managing significantly higher burdens than the average desktop workstation. If your business has a server onsite, there are so many things you need to consider to get the most out of your investment. Read on for a few of them: Mount your servers properly Small businesses are […]
Android Gmail gets phishing protections
Phishing scams, whereby cybercriminals masquerade as trustworthy entities to fool victims into disclosing private information, have had a recent surge in popularity. This is largely because hackers realize the best way to infiltrate a system is by exploiting people’s trust.
Office 365 gets new security tools
Security is, by far, the biggest issue concerning most businesses today. Although safeguards like firewalls and antivirus software are necessary, they’re no longer sufficient in dealing with increasingly sophisticated cyberattacks. Today, companies require multiple layers of security to steer clear of cyberattacks and compliance woes.
Windows 10 is getting a new update schedule
If you’ve ever had a problem with how Microsoft Windows updates are rolled out, we have some good news. In a recent announcement, the team behind the world’s most popular operating system promised to make updates more consistent and user friendly.
Warning: Do not install “Google Defender”
With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.