What are watering hole attacks?

When talking about cyberattacks, the first one that usually comes to mind is phishing, a scam that uses email to spread malware or steal personal information. But hackers have a new method to infiltrate your systems, and it’s surprisingly effective. Here’s what you need to know about watering hole attacks. What are watering hole attacks? […]

Non-financial blockchain solutions

Despite internet connections that deliver information to the other side of the globe in milliseconds, countless industries still rely on slow and inefficient middlemen to complete transactions. From supply chain management to hi-tech contracts, blockchain isn’t just about money, it’s about an entirely new way to do business. Just look at our examples. What is […]

Protect your Facebook data with these 3 steps

Facebook users woke up to a nightmare when they heard that the social media giant and associated app developers were selling their sensitive data to companies, like Cambridge Analytica, without their consent. So if you’re concerned about being one of the 50 million users whose data have already been sold, you should check out the […]

Gearing up for phishing scams in tax season

Paying and filing taxes is already annoying without the threat of refund fraud or identity theft. But phishing schemes, especially during tax season, have become so widespread that you’ve probably already received spoofed emails or calls during the last few years. To maintain the security of your business, you and your employees need to be […]

Quick recoveries with external IT support

Small-business owners with limited financial resources have to manage their office IT on their own. Although this might work for a while, it can grow into a massive problem when the business starts expanding. At that point, you’ll want to focus on that expansion, not repairing tech problems. This is where external IT support comes […]

Hypervisors: potential risks and threats

The virtualization trend is still going strong, offering businesses streamlined resource management and massive cost-saving potential, but just like every technology, it has its fair share of security risks. In fact, a virtualization solution is only as secure as the hypervisors that support it. What is a hypervisor and what are its risks? For those […]

Equifax finds more users hit by major breach

Everyone thought the worst was over when credit-reporting agency Equifax revealed that the credentials of 145.5 million people in the US were leaked. However, the company recently discovered that there are more victims from the major breach. Here’s everything you need to know. What happened? On March 1, Equifax reported that the names and driver’s […]

Chrome users panic as new scam spreads

During the previous quarter, fake Chrome notifications urging users to dial a tech support number have grown dramatically. Research reveals that this tech support scam could possibly use an Application Programming Interface (API) to freeze the browser, convincing the user to get in touch with the support line and share their credit card details. The […]

Enlist IT help when installing CPU updates

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released. Let’s review […]

New Office attack method puts users in danger

From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools. What’s the new Office threat? The Office exploit takes advantage of […]