The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.
Although iPhone bugs and malware are typically unheard of, there’s one circulating the web that you should be aware of right now. The bug, which was discovered in Reddit, is a brief, five-second video that when played causes your iPhone to freeze and ultimately crash.
The new features recently unveiled by Office 365 promise to bring business owners to a more secure and knowledgeable position in which to make important decisions regarding the future of their corporation. Microsoft expanded the popular program’s basic scope to include data protection and productivity tools, including the replacement of Delve Analytics with the MyAnalytics add-on.
When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people.
The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.
Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.
Here on earth, clouds are relatively simple phenomena: visible masses of water vapor making their way across the sky. But in the world of IT, “the cloud” is a bit more complex, referring to technology that allows businesses to take a more hands-off approach to managing their IT resources.
Although WordPress is more secure than it used to be, outdated installations can be a potential threat to your website and the data that is hosted on the servers. In an attempt to shut down hackers before they can exploit vulnerabilities, the WordPress security team recently rolled out a new version that patches security loopholes and fixes several known bugs.
Picture yourself receiving a phone call from kidnappers saying that they have snatched your only child while demanding a ridiculous amount of money for their safety. Now imagine a similar scenario, but this attack is geared towards Microsoft Office 365 users, complete with a ransom note and an audio message informing victims that their files have already been encrypted.
For some NBA fans, the Milwaukee Bucks have long been a laughingstock on court. However, their most recent loss is no laughing matter. According to Yahoo! Sports, last month a team employee unknowingly sent out names, addresses, Social Security numbers, compensation information and dates of birth of players to a spoofed email account operated by a hacker.