Securities

Posts relating to Securities of all natures covering website security, data security, network security etc

How to defend against WannaCry

How to defend against WannaCry

Both businesses and individuals across dozens of countries were scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions last year. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release. What’s worse, more WannaCry variants will likely be developed in the near future, according to security …

How to defend against WannaCry Read More »

The most advanced Gmail phishing scam yet

The most advanced Gmail phishing scam yet

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as phishing, a form of social engineering, it’s a dangerous trend that is becoming increasingly prevalent. Read on to educate yourself on how to avoid …

The most advanced Gmail phishing scam yet Read More »

Microsoft Word bug What you need to know

Microsoft Word bug: What you need to know

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Earlier this year, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you’re an avid Microsoft …

Microsoft Word bug: What you need to know Read More »

The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice …

The phishing craze that’s blindsiding users Read More »

Why you need to back up your mobile devices

Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even …

Why you need to back up your mobile devices Read More »

Firmware the threat most users overlook

Firmware: the threat most users overlook

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy — and that’s totally incorrect. Read on to learn more …

Firmware: the threat most users overlook Read More »

Did Microsoft commit a security breach

Did Microsoft commit a security breach?

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission. These include hundreds of users who might be unaware that their private files can be …

Did Microsoft commit a security breach? Read More »

Security Is the government really spying on you?

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks …

Is the government really spying on you? Read More »

Scroll to Top