Quantcast
Browsing latest articles
Browse All 113 View Live

If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something,...

View Article


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop...

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a...

View Article


Beware: Attackers Buy Top Search Engine Results to Trick You

What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a...

View Article

Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect...

Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot...

View Article

Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are...

View Article


Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds...

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside...

View Article

Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers

Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home...

View Article

Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the...

A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning,...

View Article


Protect Loved Ones from Tech Support Scams and Share this Hilarious Video

A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from...

View Article


Hacker Contest Nets Winners Hundreds of Thousands of Dollars

Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them? The companies they hacked. But it isn’t ransomware; this is an example of bug bounty...

View Article
Browsing latest articles
Browse All 113 View Live