If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures.
New Android malware detected!
Are your business printers protected against hacks?
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems.
Another Windows 10 update, another raft of issues
It’s the update season for Windows 10 users. Although it’s normal for us to experience an uptick in support requests during these periods, things are looking worse than normal this time around. That’s because Microsoft’s most recent operating system update has caused data loss for some users.
Keep these in mind when shopping for antivirus software
If you think cybersecurity is only for big organizations, think again. Small- and mid-sized businesses often don’t have the budget for expensive cybersecurity tools, making them easier targets for cybercriminals. Statistics show that cybercrimes continue to increase every year.
5 Signs your VoIP network is being hacked
Voice over Internet Protocol (VoIP) is one of the technologies that have changed the way businesses operate. VoIP phones are essential for the success of your company, allowing users to do a wide range of tasks, including making calls from virtually anywhere there's an internet connection to setting up conference calls.
Security best practices for remote workers
Working from home increases employee autonomy, cuts costs, and ensures the health and safety of the company during the coronavirus pandemic. The problem is, it also increases the likelihood of security breaches since employees are working outside the company's security perimeter.
Autocomplete password risks
Web browsers come with features to improve user experience. One of the most popular ones is auto-fill passwords. These are designed for users to store and automatically use their account credentials to access websites and other applications. While auto-fill passwords are convenient, they come with security risks.
3 Hats a hacker might wear
While not always accurate in its portrayal of hackers, Hollywood does get at least one thing right: there are many types of hackers out there, all with varied methods and motivations. In this article, we’ll take a look at three main types of hackers.
The rise of VoIP phishing: Why scammers do it
Thanks to Voice over Internet Protocol (VoIP) technology, business communication has vastly improved and is now more cost-efficient. Using a variety of VoIP platforms, businesses and individual users can easily make calls and conduct video conferences.
Office 365 hacking: What you need to know
With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.
A phishing scam that harvests users’ credentials
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.