Should you worry about Facebook’s breach?

Should you worry about Facebook’s breach?

Facebook is the most popular platform for developing brand awareness because it allows businesses to target users based on what they have posted in the past. But after the recent data breach scandal, is your data still safe? Read on to find out if you need to worry about your privacy.

New scam freezes Chrome to panic users

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving chrome users. The new scam freezes Chrome and displays a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialling the fake hotline number on the screen.

Watch out for the huge KRACK in WiFi security!

Watch out for the huge KRACK in WiFi security!

A fundamental flaw with WiFi networks has recently been discovered by two security researchers. According to their reports, the KRACK vulnerability renders advanced encryption protocols useless and affects nearly every wireless device. Read on to find out more about KRACK hacks and how you can defend against them.

Equifax’s Leak: lessons learned

Equifax’s Leak: lessons learned

Before you start planning an incident response to a data leak, read the following story and recite this: Don’t walk in the footsteps of Equifax. What happened to Equifax? Equifax, the huge American credit agency announced in September 2017 that its database was hacked, resulting in a leak of tons of consumers’ private data, including […]

Beware of a new Locky-type ransomware

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.

Know these types of malware to stay protected

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

4 different types of hackers

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

How did WannaCry spread so far?

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.

Warning: Do not install “Google Defender”

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.