Criminals are placing ads on some of the most popular sites on the web. The scariest part: the ads can infect users with malware without even clicking.
Learn more about the rapidly growing threat called “malvertising.” Find out how attackers are combining zero-day exploits, malware, and online ads for a powerful attack strategy, and see how you can avoid it.Continue reading
Wire fraud is the modern-day bank heist. Instead of masks and guns, thieves use stolen email credentials and clever deception to snatch thousands of dollars. How do these heists begin? With stolen data.
Get a quick overview of wire fraud tactics so you can protect your business and your clients. See how thieves steal the data, fool the banks, and make off with the money.Continue reading
Chances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.Continue reading
The average cost of a cyber attack on a small business is more than $20,000 – and that’s just the average. Since the number of breaches shows no sign of slowing, it might be the right time to consider a cyber insurance policy for your business.
Find out if cyber insurance is right for your company in this post. We’ll show you what a cyber policy typically covers, and you’ll get tips for finding the right policy in the market.Continue reading
Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.Continue reading
Did you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?
Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.Continue reading
The threat of ransomware continues to loom over us in 2015, and some expect the storm to get worse before it clears. How can you ride out this threat?
Get the five ways to prevent a ransomware disaster at your business. We sat down with expert Amy Babinchak to get her view. Includes a link to her team’s free Cryptolocker Prevention Kit.Continue reading
Denial of service attacks used to be a mere annoyance. Today, they are a major threat to businesses and organizations worldwide – and they are getting stronger.
See how recent DDoS attacks point to trends that we expect to see in 2015. You’ll see our predictions for the coming year and the latest record-breaking attack to hit the news.Continue reading
Critroni is back for more in 2015. The ransomware still encrypts files and demands a ransom, but a few things have changed since we saw it last summer.
What's changed? How can you unlock your files? Find out inside, and see how you can avoid this menace altogether.Continue reading
You could get away with updating a firewall once a month, or maybe even once a year, in the past. Today, that's very unwise. You need to check for updates every day automatically.
See the 7 reasons why you should toss out your clients dated, manual firewall. If it updates manually, it's time to go.Continue reading