Millions more affected by Equifax leaks

Back in 2017, Equifax, one of the three major credit bureaus in the US, made a major security blunder that…

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification…

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has…

Beware of sneaky Microsoft Office malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are…

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can…

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of…

Quick review: why you need virtualization

With virtualization, you can make software see several separate computers where there is only one, or make several computers look…

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another…

Fixing computers drains your firm’s funds

Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t…

Protect your data from WannaCry

This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In…