Threats

What Is SamSam Ransomware and How to Protect Your Organization Against It screenshot

What Is SamSam Ransomware and How to Protect Your Organization Against It

SamSam is a ransomware family that's been around since 2015. It has all the classic characteristics for an operation of this sort: crooks sneak the malicious program into a Windows computer, encrypt the victim's... Read more

July 25, 2018
How Identity Thieves Use Weak Passwords to Exploit Personal Information screenshot

How Identity Thieves Use Weak Passwords to Exploit Personal Information

The internet is filled with people who have bad intentions. Sometimes they only want to cause a bit of mischief, like hacking your facebook and texting the girls in your friend list for naughty pics. Other times they... Read more

July 16, 2018
Tips To Protect Your Data Privacy At Work screenshot

Tips To Protect Your Data Privacy At Work

Those of you who spend most of the time at work sitting in front of a computer already know how tempting it is reply to a private email or check social media accounts during working hours. However, even though many... Read more

June 25, 2018
Cryptocurrency Miner Hacks: How to Avoid Becoming Their Next Target? screenshot

Cryptocurrency Miner Hacks: How to Avoid Becoming Their Next Target?

With millions upon millions of computers connected to the Internet, conclusively saying which is the most prolific form of cyberattack out there is extremely difficult. Nevertheless, most security companies seem to... Read more

May 4, 2018
Seven Types of Data Breaches in 2018: Phishing, Malware and Others screenshot

Seven Types of Data Breaches in 2018: Phishing, Malware and Others

What is the first thing you think about when you think “data breach?” Maybe you immediately imagine someone using malware to invade your virtual privacy and steal personal information? Although that is, in large part,... Read more

July 25, 2018
How to Make Sure Your Honey Browser Extension is Safe to Use? screenshot

How to Make Sure Your Honey Browser Extension is Safe to Use?

If you are a fan of online shopping as well as saving time and money with promo codes, vouchers, and discounts, you have probably heard of the popular browser extension called Honey. We are here today to clear the air... Read more

July 12, 2018
How to Protect Your Privacy & Identity Online screenshot

How to Protect Your Privacy & Identity Online

There are still many users online who may show absolutely no interest in data security and data privacy since they simply believe that they have nothing to lose or hide. There is a misbelief about protecting privacy... Read more

May 21, 2018
LabCorp Data Breach Fears Were Unfounded. It Was a Ransomware Attack screenshot

LabCorp Data Breach Fears Were Unfounded. It Was a Ransomware Attack

Laboratory Corporation of America Holdings or LabCorp has 60 thousand employees worldwide, helps with clinical trials in close to 100 countries, and processes around 2.5 million lab tests every week. This means that... Read more

July 20, 2018
How to Avoid Malicious Chrome Extensions screenshot

How to Avoid Malicious Chrome Extensions

Browser extensions can completely transform our online experience. They can do anything from blocking ads, to displaying inspirational quotes, to actually helping you be more productive. The more popular the browser,... Read more

June 27, 2018
How Much Private Information Do You Give Away Every Day? screenshot

How Much Private Information Do You Give Away Every Day?

In the era of forums and social media, data privacy becomes ever more important as there are more and more dangers for the unsuspecting computer users to disclose private personal information. You may easily become... Read more

May 16, 2018
Loading...