Social networks like Facebook and Twitter have become preferred channels for hackers. They are being used to attack small businesses, individuals, and even the Department of Defense.
Know the types of attacks to watch for in social media. See how quickly the threat is growing, and why hackers are learning to love Facebook more than email.Continue reading
A new and dangerous strain of ransomware known as WannaCry exploded onto the web last week, seizing an estimated 300,000 computer systems in just a few days.
Read on to find out how you can protect yourself and your clients from this infectious malware.Continue reading
Malware is no strange foe to network security. But a few new tactics are raising eyebrows, such as “blastware” that destroys the systems that flag it as a threat.
See examples of new types of malware threats and what you can do about them. You’ll get a list of tips to help keep your clients safe.Continue reading
A ransomware plague has struck hospitals and other healthcare organizations across the U.S. Victims are paying ransoms of nearly $20,000 to unlock millions of files.
How does this happen? Why is healthcare a target? What can you do to protect yourself? Read on to find out.Continue reading
Criminals are placing ads on some of the most popular sites on the web. The scariest part: the ads can infect users with malware without even clicking.
Learn more about the rapidly growing threat called “malvertising.” Find out how attackers are combining zero-day exploits, malware, and online ads for a powerful attack strategy, and see how you can avoid it.Continue reading
The Bash vulnerability known as Shellshock is not hitting SMB IT providers as hard as other companies, but it does raise questions about their vendors.
Are your technology vendors making the right choices for your security? How have they responded to this new threat? We explore these topics and more inside.Continue reading
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.Continue reading
Basic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.Continue reading