Security & Privacy

August 22, 2016

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing […]
August 22, 2016

Devious Tricks That Cybercriminals Use to Scam Businesses

Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but rather with low-tech emails. The U.S. Federal […]
June 30, 2016

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Spear phishing con artists are becoming more clever and sophisticated in their attempts to trick people into falling for their scams. For instance, they now sometimes […]
June 30, 2016

5 Ways to Protect Your Business’s Email Accounts from Hackers

A hacked email account is a serious problem. Besides reading emails, cybercriminals can access other types of information associated with the account, such as calendar and […]
April 26, 2016

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses’ files and hold them for ransom. As a result, headlines about these attacks abound in […]
April 26, 2016

Nearly 90 Percent of Android Smartphones Are Vulnerable to Malware

Almost 90 percent of Android smartphones are vulnerable to malware, according to a 2015 study. It is not because of something that their owners are doing […]
March 16, 2016

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, […]
February 10, 2016

The Right and Wrong Ways to Get Rid of Old Computers

Before getting rid of an old computer, you need to make sure that all the personal and sensitive data on the hard drive is irretrievable. If […]
October 13, 2015

How to Spot Phishing Attacks

One of the main tools in a hacker’s toolbox is the phishing attack. Hackers use these large-scale attacks to steal personal information from as many people […]