Spectre & Meltdown safety for Apple devices

Like many security flaws, the Spectre and Meltdown bugs can leak critical data from computers and mobile devices for hackers to exploit. What makes them unique is the vast number of PCs, laptops, tablets, and smartphones they affect. But if you use an Apple device, there are fixes that can help you temporarily protect against […]

Phishing alert: scammers now use encryption

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites.

HP laptop users beware: keylogger found

Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do is install a keylogger on one’s computing device.

Who and What causes a Healthcare Breach

Technology advancements have revolutionized the healthcare industry, but with security breaches hitting an all-time high and shattering records year after year, what and who do companies have to be wary about? Read on to find out. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records […]

Apple releases KRACK patch in latest OS

Together with a new batch of emojis, the latest macOS update comes with security, stability, and reliability improvements. As usual, Apple recommends that Mac users update to macOS 10.13.1 High Sierra, and with good reason: It includes an essential patch to the recently discovered WiFi security vulnerability, KRACK. Why you should update now Foremost on […]

How to protect your VoIP system from phishing

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Steer clear from these types of malware

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

Beware: Nyetya is worse than WannaCry

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small […]

Outdated firmware is worse than you realize

Most IT consultants constantly remind clients of how important it is to update and patch their software, but neglect the importance of updating hardware. We don’t mean replacing it with new hardware; we mean updating the applications and settings coded into the physical IT powering every modern office.

Popular printer brands are prone to attacks

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs.