How to protect your organization from social engineering

How to protect your organization from social engineering

Have you ever received the notorious email from the Nigerian prince who promises you one million dollars in exchange for your social security number, date of birth, address, and credit card details? While this seems like a poorly disguised scam, you'd be surprised by how many people are actually fooled by this social engineering trick.

Black and white: Not all hackers are bad

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.

5 ways to protect your business from ransomware

5 ways to protect your business from ransomware

Ransomware is one of the most pervasive and dangerous threats facing the business community. It is a particularly nasty type of malware that holds your crucial files hostage and demands a “ransom” payment to release them. Ransomware poses a potentially devastating impact on companies on a global scale.

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.