A short film produced by HP comically illustrates the fact that there are a lot more things to consider when creating a secure network for your company and shows that cyber threats can come from anywhere. No, this isn’t about a geeky fan remake of a Leonardo DiCaprio film. It’s actually about an actual short
Author Archives: Nate Livingston
A Russian cyber crime gang created a trojan malware program that mimics mobile banking applications, and although people were affected locally at the time of its shutdown, This post talks about the mimicry and ways to ensure you’re not being duped. You should really make sure you know what you’re downloading. On Monday, the Russian
Twitter has a few unknown features that are available to businesses and other accounts that are managed by multiple people. One is called Teams and allows many people to perform regular actions on the account without permissions to change settings. This and other things are some ways Twitter is improving cyber safety for its users.
Two-step verification or two-factor authentication is growing more and more common, and this article talks about its evolution, and why you should incorporate it with all your accounts. What do Bollywood, WordPress, and Game of Thrones all have in common? If the title didn’t give it away you wouldn’t have been able to guess it.
Adyllkuzz is a cryptocurrency mining software that stealthily installs on your computer undetected, using the same NSA-Leaked exploit as the recent global ransomware attacks. Maintaining current software is one way you can prevent malware injection on your computer. Looks like you’re probably gonna be safe from ransomware on this one. But it’s always good to
Though not weaponized and malicious as of yet, EternalRocks is a worm that could potentially do more damage than the WannaCry ransomware on which it is based, because it utilizes more of the NSA-leaked Windows exploits than its predecessor. Remember Fast And Furious 7, where Jason Statham entered the franchise as the “big bad brother”
The WannaCry ransomware attacks seem to have subsided, but there is still a chance you could be attacked, and you will need to update your operating system and maintain those updates in order to be safe from this and future attacks. I actually don’t want to cry at all. I mean, a 22-year-old software engineer
File Sharing services like Dropbox and Google Drive are potential vulnerabilities to the security of your company because lower standards of security on the other ends of filesharing can allow for infected files to bypass a secured network. File Sharing over the internet seems like the best thing since microwave popcorn (or Star Wars, whichever
Many different types of phishing schemes are out there, and familiarizing yourself with them can better protect you against cyber threats that use these socially-engineered methods. It seems so easy. All you have to do is not click the link, or not open the attachment. But unfortunately, curiosity killed the cat and caused a loss
In mid-May, a ransomware attack known as WannaCry preyed upon thousands of systems, utilizing exploits that were leaked from the NSA earlier this year. Make sure your computer is constantly updated to avoid attacks. If you’re reading this, you are probably at risk. According to the U.S. Census, more than 75% of households in America