New Security Flaw Targets Wireless Mice

Wireless mice and keyboards have been a staple for any office space looking for a clean cut look, and has been increasing in popularity steadily over the years. But it seems that even this innocent aesthetic improvement is now being exploited by cyber criminals.     Recently a relatively new malware known as Mousejack has […]

TeslaCrypt Ransomware Authors Release Master Key

Eset announced on Wednesday that it has developed a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files. The criminal group behind TeslaCrypt recently abandoned support for the malicious software, Eset contacted the group anonymously using the channel TeslaCrypt’s operators offered to ransomware victims and asked for the universal […]

Hackers Selling 117 Million LinkedIn Passwords

LinkedIn experienced a massive hacking four years ago, what initially seemed to be a theft of 6.5 million passwords has revealed itself to be a breach of nearly 117 million. Last Wednesday the professional social network revealed that the massive compromise of login credentials were being sold on the black market. The largest problem with […]

7 Ways To Spot A Phishing Email

Phishing Emails

Phishing attacks are one of the most common and effective ways for cyber criminals to gain access to your personal data, and wreak havoc on your computer. Worse yet, they are on the rise and costing companies and organizations around the world billions of dollars every year. Phishing emails find their way into at least half of […]

Damage Control: What To Do After A Phishing Attack

Despite all your vigilance and best efforts, a seemingly innocent email has revealed itself to be a malicious phishing attack. And unfortunately you unknowingly fell victim and franticly searching the internet for a solution.     Phishing emails have been increasingly difficult to detect with the naked eye, the average user cannot tell the difference […]

Cybersecurity Experts Find Flaw in International Network

An international team of cybersecurity experts gained access to an iPhone loaned to a U.S. congressman in a controlled hacking. The congressman who sits on the House Oversight and Reform Subcommittee, was part of a 60 Minutes demonstration of how easy it is for a criminal to spy on public figures.   The hackers were able […]

What Protek Does to Shield You From Ransomware

April saw the largest increase in Ransomware attacks in the history of the malware, an increase of 159% from just the previous month. But the prevalence of Ransomware is not a new occurrence; the malware has been slowly increasing in popularity with an average increase in usage of 9-20% each month.   Ransomware is especially […]

3 Shopping Tips to Protect Yourself from the Next Major Retail Data Breach

Data Breach

Major retailers are having a rough time of it these days concerning the security of their customer’s financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What’s a connoisseur of mass-produced boxed goods to do? […]

Microsoft Teams

Crime might pay for those bold enough to do it, but that doesn’t mean everyone should. Hackers likely don’t take into account the fact that they are costing the world countless millions of dollars in damage only to further their own gain, and their influence can have far-reaching effects on people all over the world, […]

Global

Do you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. Keeping your cloud-based data safe is an important solution. When it comes to cloud storage security, there […]