Don’t let hackers fool you with these tricks
Phishing Phishing scams are perhaps the most common type of social engineering attack. Usually seen as links embedded in email messages,...
Free decryption tools fight ransomware
The way in which these nefarious operators commandeer your information and deny you access usually involves some fairly sophisticated...
5 security measures made easy
1. Two-Factor Authentication Did an attacker get your password? With two-factor authentication they’ll still need your mobile device to...
WordPress 4.5.3 patches security vulnerabilities
What’s new in WordPress 4.5.3? The latest WordPress version includes fixes for more than two dozen critical vulnerabilities, including:...
Game Over: NBA team losses valuable data
For some NBA fans, the Milwaukee Bucks have long been a laughingstock on court. However, their most recent loss is no laughing matter....
Ransomware to begin self-propagation
Ransomware, the malware that locks up infected systems and demands payment to return access to users, has been steadily increasing its...
Are your site’s images hiding an attack?
What is ImageMagick? ImageMagick is a tool that allows sites to easily crop, resize, and store images uploaded by third parties. Vendors...
Understand these 4 types of hackers
Script Kiddies When it comes to skill level, Script Kiddies are at the bottom of the totem pole and often use scripts or other automated...
Understand these 4 types of hackers
#security #2016apr28securityc #cybercriminal #insider #hacktivist #hackers #attack #motives #scriptkiddie
4 BYOD security risks you should address
Data leakage The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the...