You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic …

Most Travelers Are Oblivious To Security Risks During Travel

Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a …

How Long Before You Experience A Cyber Attack?

According to this year’s Traveler’s Risk Index, published by The Traveler’s Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 percent of survey respondents indicating that they believe a cyber-attack is inevitable. The other statistics in the report …

An Exploited Website Can Cause Apple Products To Crash

Users of Apple tech have a new reason to worry.  A security researcher named Sabri Haddouche, who works for an instant messaging app called “Wire,” has published a proof of concept web page. It contains a fatal exploit that can crash and restart iPhones, iPads and any Mac. Essentially then, …

Popular NAS Device May Easily Be Compromised

Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too.  The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of …

Malware Reports Continue To Rise 

We’ve known for some time now that the next big crisis the internet will have to come to grips with is the dramatic rise of the Internet of Things (IOT). The problem isn’t with the devices themselves, which are enormously helpful and rapidly growing in their popularity.  Rather, it lies …

Your Business Email Is Highly Targeted For Attacks

There’s a new report out, authored by ProofPoint, and its findings for business are grim. It’s no secret that businesses of all shapes and sizes are coming under increasing fire from hackers around the world. Now we have hard data that shows us exactly how big of an increase we’re …

Tech Support Scammers Are Advertising Online 

Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …