Criminals are placing ads on some of the most popular sites on the web. The scariest part: the ads can infect users with malware without even clicking.
Learn more about the rapidly growing threat called “malvertising.” Find out how attackers are combining zero-day exploits, malware, and online ads for a powerful attack strategy, and see how you can avoid it.Continue reading
The threat of ransomware continues to loom over us in 2015, and some expect the storm to get worse before it clears. How can you ride out this threat?
Get the five ways to prevent a ransomware disaster at your business. We sat down with expert Amy Babinchak to get her view. Includes a link to her team’s free Cryptolocker Prevention Kit.Continue reading
Critroni is back for more in 2015. The ransomware still encrypts files and demands a ransom, but a few things have changed since we saw it last summer.
What's changed? How can you unlock your files? Find out inside, and see how you can avoid this menace altogether.Continue reading
CryptoWall is the latest strain of ransomware to lock files and demand ransom payments to release them. But does paying the ransom work?
You'll find out inside. You'll also learn more about the threat and how to prevent it from hurting your organization.Continue reading
The Bash vulnerability known as Shellshock is not hitting SMB IT providers as hard as other companies, but it does raise questions about their vendors.
Are your technology vendors making the right choices for your security? How have they responded to this new threat? We explore these topics and more inside.Continue reading
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.Continue reading
Basic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.Continue reading
Is Cryptolocker really dead? Some researchers have doubts -- even as new types of ransomware continue to attack computers across the globe.
In this post, you'll get an update on Cryptolocker and say "hi" to a new, potentially stronger brand of ransomware: Critroni.Continue reading
The war against malware and malicious websites never ends. But with a little intel and some firepower, your team can keep your office and your clients safe.
See the top 10 ISPs that host the most malware. Also find out which countries are rising in the malware market and which file types to watch out for.Continue reading