Our Blog

September 24, 2020

Google Releases a version of iPhone AirDrop on Androids

By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works […]
September 21, 2020

Remote Desktop Protocol Users have Highest Risk of Ransomware Attacks

As more schools and businesses find themselves going online, Remote Desktop Protocol (RDP) users are more vulnerable than ever to a ransomware attack. Learn more about […]
September 17, 2020

How Contact-Tracing Apps Work

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate.
September 14, 2020

Typosquatting: A Serious But Avoidable Type of Cybercrime

Accidentally transposing two letters is all it might take to become a typosquatting victim. Find out what typosquatting is and how to avoid becoming a victim.
September 10, 2020

Mozilla Has Temporarily Shut Down Its Free File-Sharing Service Amid Growing Abuse

After receiving reports that cybercriminals were increasingly using Firefox Send to distribute malware, Mozilla took this file-sharing service offline. Find out why the service was commonly […]
September 8, 2020

3 Significant Developments in Ransomware Campaigns

Cybercriminals are continually trying to make their ransomware campaigns more effective. Here are three developments you should know about.
September 3, 2020

How to Protect Your Mobile Device from Malicious Apps

Researchers recently discovered a dozen malware-laden apps in the Google Play store. Learn about these apps and how to protect your mobile device from them.
August 31, 2020

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]
August 27, 2020

Huawei Ban Spreads as 5G Network Approaches Rollout

Trade constraints interfere with mobilization of 5G network platform due to concerns of espionage, semiconductor sales and backdoor security risks.