We have talked a lot about ransomeware in the last year here on the cat.man.du blog, and its for a reason. Ransomeware is quickly becoming the largest malware threat in the world. The number of attacks has increased by over 500% in less than a year.
"Cisco security researchers have turned their spotlight on ransomware, examining innovations that may cause this particular type of malware attack to become far more prevalent." What does this mean for the business world? It means that your standard firewall is no longer getting the job done.
Traveling with a laptop can represent a significant security risk to your business. This is because the data it contains is far more vulnerable when you are on the move than when you use a laptop in the relative safety of your office or home environment. It doesn't have to be stolen because it takes just seconds for a hacker to slip a USB stick into a laptop when it is unattended to install malicious software or steal data.
This series of blogs will pick out a certain type of cyber threat and we will tell you what you need to know and tips about how to prevent these attacks. First up: Malware
We remember the days before hackers, before malware and ransomware, before anti-virus and firewalls. Unfortunately, those days are a distant memory, and even your basic firewall can be compromised by cybercriminals. Lets get to know a little more about these threats so we can stop making cyber criminals so rich.
We can't stress the importance of a good strong password enough. It could be the difference between your computer being hacked and your information getting stolen or your files staying safe. Here are a few tips on how to create the perfect front line defense, your password.
Pokémon Go, the outrageously popular new game that brings Pokémon into the real world, is causing quite a few scary real-world consequences. Players have been robbed at Pokéstops already and one even discovered a dead body while exploring for Pokémon. The craze for this new game even has people from around the world trying everything they can to download the app even in countries it is not yet released in. Hackers are figuring this out and it was a total of 3 days after the game was released in the US that the first malicious attacks were being made.
Cybercriminals can use your computer to steal your personal information and install malware and inevitably make a lot of money off you if you're not extremely careful. Here are a few questions to rate your knowledge about computer crime and how to avoid becoming a victim.
How smart are you when it comes to spyware? Take our short quiz and find out!
Just as the #brexit hashtag was rising to the top of the trending news for the world last week, so was the email scam that plays off that hype. A new phishing email is making it’s way around with a subject line that hints at some huge imminent economic or political disaster, in the hope that potential victims won't be able to resist the temptation to find out all the 'juicy details'.
What is an Email Phishing Scam?
“Phishing” is a homophone of fishing, which involves using lures to catch fish. It is a malicious message that victims often receive that is allegedly sent from a trustworthy site or organization that often includes a link or attachment that can install malware on your computer, or can direct the victim to a malicious website that will ask for personal and financial information all for the purpose of monetary gain by a cybercriminal. Some phishing emails are poorly written and obviously fake, but sophisticated cybercriminals use techniques of professional marketers to identify the most effective types of messages or the phishing "hooks" that get the highest open or click through rate.
Now that cloud based computing and storage have become a norm in over 70 percent of businesses by 2016, it’s shocking to find out how very few of those businesses are legitimately concerned with the vulnerability and security risks that come along with this new technology. With the cloud, you’re benefiting from lower fixed costs, more flexibility, automatic updates, and increased flexibility just to name a few, but there are also a handful of new security threats that are associated that businesses should consider and actively work to prevent.