Watch out for this Android malware

Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected. To help you avoid this dangerous strain of malware, we’ve compiled […]

Nasty malware can bypass Windows 10 security

Researchers have discovered a type of malware that can easily bypass the security protocols of Windows 10. This malware is a new variation of ransomware called Snatch, and it comes with an added data stealer component. Designed to target corporate networks rather than consumers, Snatch has been modified to reboot your PC in Safe Mode […]

The risks of jailbreaking your iPad

While the iPad and other Apple devices allow you to download and install literally millions of apps, they don’t exactly leave much room for customization. Jailbreaking lets you fully customize your iPad by enabling you to install third-party apps on your device. But it’s not without risks. Here’s why you should think twice before jailbreaking your […]

Is your Office 365 environment secure?

Microsoft’s Office 365 is one of the most powerful business productivity tools today. This cloud-hosted suite lets users work anywhere and collaborate easily. Although it’s undoubtedly useful, Office 365 may present a few security challenges that businesses must address. Vulnerabilities in SharePoint Businesses typically use SharePoint Online and on-premises SharePoint sites to store sensitive data […]

9 Cybersecurity terms you need to know

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or […]

How to protect yourself from cryptojacking

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds.  If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do. Hijacked hardware Instead of paying for computing […]

Warning signs your computer has malware

With the rise of eCommerce and online banking, cybercrime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cybercriminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and […]

Are Macs vulnerable to viruses?

It is common knowledge that Windows computers tend to deal with an assortment of viruses and malware, but many people fail to realize that even Macs face similar threats. Virus creators have become adept at finding back doors and other vulnerabilities, that even Macs can be targeted. Viruses that affect Macs There are four general […]