Fileless malware: Are you at risk?

Over the past few years, the security industry has witnessed a rapid evolution in attack techniques, including fileless malware. Now, cybercriminals use legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities like unauthorized data retrieval or data damage.

Researchers uncover new strain of Android malware

The Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is, Android’s open-sourced nature also makes it susceptible to cyberthreats. Recently, security experts found DEFENSOR ID — a new type of Android malware exploiting the system’s Accessibility Services.

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats.

The risks of autocomplete passwords

Hackers may have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know. Why auto-fill passwords are so dangerous Certain web browsers have integrated features that enable usernames and passwords to be automatically entered into a web form.

Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with so much news about nude celebrity photos beings released to the cloud, millions of customer information being stolen across many industries, and government agencies paying the ransoms hackers demand so that the former can regain access and control of their systems.

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

Don’t skip security audits for your business

One step in the network security cycle you should never skip is security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and uphold […]

BYOD tips to improve security

Lax bring your own device (BYOD) policies are a growing concern for businesses. If not managed properly, these can pose security risks to your organization. How can you mitigate the risks associated with the BYOD trend? Whether your employees are using smartphones, tablets, or laptops, you need a BYOD security policy.

5 Bad business security practices

Companies — small- and medium-sized businesses, in particular — struggle to protect their data. For one, they make mistakes in the strategies they employ to protect their IT infrastructure. If your organization still does one or more of these bad security practices, act quickly to correct them.

5 Most common security breaches

These days, the security of various IT systems is constantly being called into question. From attacks on mobile devices to ever-increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to stay protected is to be aware of common cybersecurity issues.

What you need to know about juice jacking

We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.