Sophisticated Spyware Finally Discovered
Smantec and Kaspersky Lab last week separately announced the discovery of a highly sophisticated advanced persistent threat that had eluded security researchers for at least five years. A previously unknown group called “Strider” has been using Remsec, an advanced tool that seems to be designed primarily for spying. Its code contains a reference to Sauron, […]
Edward Snowden Tackles Phone Security
When Edward Snowden met with reporters in a Hong Kong hotel room to reveal NSA secrets, he famously asked them to put their phones in the fridge to block any radio signals that might be used to secretly activate the devices microphones or cameras. It’s fitting then that 3 years later he has returned to […]
7 Ways To Spot A Phishing Email

Phishing attacks are one of the most common and effective ways for cyber criminals to gain access to your personal data, and wreak havoc on your computer. Worse yet, they are on the rise and costing companies and organizations around the world billions of dollars every year. Phishing emails find their way into at least half of […]
Damage Control: What To Do After A Phishing Attack
Despite all your vigilance and best efforts, a seemingly innocent email has revealed itself to be a malicious phishing attack. And unfortunately you unknowingly fell victim and franticly searching the internet for a solution. Phishing emails have been increasingly difficult to detect with the naked eye, the average user cannot tell the difference […]
Dark Web: Drugs, Assassins, Weapon Sales, and More

The Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices; known as the dark web. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet. Specifically, the Internet […]
MicrosoftTeams-image

Modern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, presenting a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called […]