5 new cyberthreats pop up every second, here’s how to protect yourself

The rapid growth suggests that cyber criminals are drawn to the ease of infecting a user’s system and collecting the payments…

Techrepublic.com click the link to read the rest of the story?

How are you protecting yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Ransomware: An executive guide to one of the biggest menaces on the web

Everything you need to know about ransomware: how it started, why it’s booming, how to protect against it, and what to do if your PC’s infected.

zdnet.com click the link to read the rest of the story.?

What have you done to protect yourself from a ransomware attack?
Join the conversation on our Facebook Page!

WPA3 Wi-Fi is here, and it’s harder to hack

New Wi-Fi routers will come with stronger protections for the data that flows between your computers, phones or smart home devices and your internet connection. It will also boost security in workplace

Cnet.com click the link to read the rest of the story.

Are you ready to switch to WPA3?
Join the conversation on our Facebook Page!

Your Wi-Fi Security Is Probably Weak. Here’s How to Fix That.

If your router is infected with malicious software, all your internet-connected devices become vulnerable, including your smartphone, computer, smart watch, television and Amazon Echo.

NY Times.com click the link to read the rest of the story.

How old is your router?
Join the conversation on our Facebook Page!

New Windows malware provides complete control over its victims

Mylobot incorporates a delaying mechanism which waits for two weeks before making contact with the attacker’s command and control servers — another means of avoiding detection.

ZDNet.com click the link to read the rest of the story.

Have you been part of a botnet in the past?
Join the conversation on our Facebook Page!

Deadly attacks feared as hackers target industrial sites

Security

“This is no longer about data theft or business disruption. Someone can get hurt. It’s about physical consequences,” said Dan Scali, senior manager for FireEye’s industrial control system security consulting practice.

TheHill.com Click the link to read the rest of the story.

What contingency plans do you have if your business is disrupted?

Join the conversation on our Facebook Page!

Windows warning: Tech-support scammers are ramping up attacks, says Microsoft

Security

The FBI has recently seen a new trend emerging for scammers to retarget past tech-support victims by posing as government officials or law enforcement, and offering assistance recovering lost funds for further fees.  Some scammers also threaten legal action if victims don’t pay to settle outstanding debts for tech-support services.

zdnet.com Click the link to read the rest of the story.

Have you been scammed?

Join the conversation on our Facebook Page!

Bad bots detected on 100% of web login pages, here’s how to protect your business

All websites with login pages have been hit with bad bot traffic and face Account Takeover (ATO) attempts, according to a Tuesday report from Distil Networks.

techrepublic.com Click the link to read the rest of the story.

Are you sure your business website is safe from attack?

Join the conversation on our Facebook Page!

Windows 10: We’re going to kill off passwords and here’s how

Singh said the goal was to make it possible for end users to never deal with a password in their day-to-day lives, and to provide instead user credentials that cannot be cracked, breached, or phished.

ZDNET Click the link to read the rest of the story.

Are you ready to quit using passwords?

Join the conversation on our Facebook Page!

 

This is how it feels to face a major cyber attack

Intense, stressful, petrifying: those are just some of the words used to describe what it was to be at the center of some of the biggest and most high profile cyber attacks to take place over the last year.

ZDNET Click the link to read the rest of the story.

Has your business been crippled in a Cyber Attack?

Join the conversation on our Facebook Page!

Nearly everything in the Facebook ‘hacking’ reports are wrong

two key points to remember…

  1. None of what I just described involves ‘hacking’ Facebook or exploiting a bug. Instead, it all revolves around the use of a feature that Facebook provided to all developers and (at least) tens of thousands took advantage of.
  2. The data collected was not internal Facebook data. It was data that developers (s̵c̵r̵a̵p̵e̵d̵ ) accessed* from the profiles of people who downloaded their apps (and their friends).

Medium click the link to read the rest of the story.

Does it bother you that they sell what should be your information?

Join the conversation on our Facebook Page!