Category: <span>Privacy</span>

Sophos uses advanced AI to protect users’ email security Email is a vital part of the business environment. Cyber criminals have been quick to exploit that fact. According to the FBI, there has been more than a 400% increase year-over-year in phishing attacks. In fact, more than 90% of cyberattacks infiltrate an organization via email. […]

How an unsuspecting employee let hackers into their computer network Needing to use multi-factor authentication (MFA) every day, multiple times a day, can be seen as a real headache to deal with. Enough so that hackers are using human behavior regarding MFA against them in order to steal vital business information which is usually caused […]

Here are 5 signs of malware that you need to be aware of. Letting your guard down for even a little bit can result in malware on your system. When that happens, it’s important to recognize the potential symptoms so that you can clear it from your system as soon as possible. Signs of Malware […]

A weaponized malware is now available on the public domain A working exploit that is capable of doing actual damage has been made available online. This fully weaponized exploit takes advantage of the Spectre CPU vulnerability. The Spectre issue is a CPU bug that is due to a hardware design flaw in the architectures of […]

Update now! Emergency zero-day patch released There’s a new update out that addresses four previously unknown or ‘zero-day’ vulnerabilities in Exchange Server. Microsoft is encouraging their customers to apply the updates as soon as possible because the flaws are rated critical. Exchange Server 2013, 2016, and 2019 are affected. Exchange Online is not affected. The […]

Companies are frequently using tracking tech in emails The BBC commissioned the Hey email provider to analyze the use of invisible tracking tech that companies are including in emails that they send out. Hey’s review resulted in uncovering the uncomfortable truth that two-thirds of emails sent to users’ personal accounts contained what is referred to […]

SolarWinds hack gives hackers access to thousands of companies Hackers were able to access emails and other secure information from the U.S. Treasury, Justice, Commerce, and other departments and agencies due to what Microsoft is calling the largest and most sophisticated attack that the world has ever seen. The hacking campaign targeted the SolarWinds Corporation, […]

Apple update protects user IPs from Google Apple has an upcoming iOS release currently in beta that is expected to be released in the coming months. One of the features of the upcoming iOS 14.5 release is a workaround meant to preserve user privacy and to prevent Google from recording the IP addresses of iOS […]

Lax security measures allow for Florida water plant hack In yet another case of poor security practices allowing for potentially catastrophic consequences, a Florida water plant was hacked earlier this month. The Oldsmar plant in question was able to be hacked through the remote-access program TeamViewer. The cyber criminal was able to log in through […]

Your 10-Step Guide to Preventing Ransomware Attacks Ransomware attacks can do a lot of damage to businesses. Once ransomware has been allowed to infect your computer, it begins the process of holding your data hostage. A ransom is then demanded by the cybercriminal in exchange for your data. Unfortunately, even if you pay the ransom, […]