Cybersecurity for small- and medium-sized businesses

Has your organization been hit with a data breach or ransomware recently? This happens more often than you might think…

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal…

Why you should back up your mobile devices

Almost every modern mobile device allows you to send and receive emails, download and upload media files, store data, and…

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow…

Why businesses need web monitoring

The internet is indispensable for improving business productivity, but it’s also an outlet for procrastination. With unfettered access to the…

Malware strain infects 200k more devices

Yet another global malware infection has been making headlines and the story just took a turn for the worse. When…

Should you worry about the new IoT malware?

A malware infection is one of the worst things that could happen to your Internet of Things (IoT) devices. But…

New malware infects SOHO routers worldwide

Talos recently warned that at least half a million routers have been endangered by a new form of malware called…

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification…

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of…