How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.

Secure Your iPhone, iPad or Apple Product By April 7th.

A Hacker Group calling themselves the 'Turkish Crime Family' has threatened to wipe millions of iPhones, iPads, iMacs, Smartwatches and other Apple products.

The Turkish Crime Family (That are actually based in London) have told apple that if they do not receive a 'ransom' of $100,000 in Itunes gift cards or $75,000 by April 7th, they will go ahead with the remote wipes.

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.

New cyber-threats in 2017 to watch out for

The New Year is here, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]

Ransomware – The New Age Criminals

Goodbye Gangsters and Muggers, there is a new way to take advantage of innocent people - through technology. Internet criminals are discrete, ruthless, can and will take advantage where there is money to be made.

We've all heard of them before, but maybe not so much in detail, so I've created a short series pinpointing the different Internet criminals/hackers and malware that could potentially attack you.