Your Router Can Host Some Pretty Nasty Malware

router_can_host_malware_400.jpg

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs […]

Email Attachments are Schrӧdinger’s New Cat

Schrdingers_Cat_Lives_Dies_400.jpg

Have you ever heard of the physicist Erwin Schrӧdinger? He is most well-known for explaining a paradox related to quantum physics which involves a cat. Even though the theory behind Schrӧdinger’s cat is meant to explain something quite different, it can still be applied to a lot of different concepts. In particular, when explaining email […]

How to Spot Three Forms of Phishing Attacks

three_phishing_scams_400.jpg

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and […]

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

ponzi_pyradmid_money400.jpg

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? […]

5 Security Threats that Spell Doom for Any Organization

you_face_security_threats_400.jpg

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for. VirusesViruses are bits of code that plant […]

These Police Officers Called for Backup… and it was Infected with Ransomware

police_ransomware_400.jpg

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware. Before you […]

Rootkit Hacks are Nasty, But Preventable

rootkits_good_or_bad_400.jpg

The challenge for business owners is that there are so many different types of online threats, it borders on impossible to protect themselves from all of them. All of these threats hold limitless possibility to ruin your organization’s operations, either short-term or long-term. One of the most common threats out there is called a rootkit […]

How Downloading Free Adware Can Lead to Malicious Crapware

downloading_unwanted_software_400.jpg

One benefit of the Internet is that, if you search hard enough, you’ll likely find a free tool or app for virtually any common computing task. While certainly advantageous, freeware often comes with a hidden price, like having to also download additional, unwanted software, aka, “crapware.” If this freeware isn’t properly managed, it can wreak […]

Without Protection, Your USB Ports Could Become RIP Ports

usbad_idea_400.jpg

It seems like everything available today can function with a USB connection, be it a thumb drive, device charger, or a desktop device–there are even USB-powered mini fridges meant for a single soda can. Unfortunately, “everything” includes malicious devices and malware. If a USB drive is infected by malware, you can put your computer and […]

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

new_petya_friend_400.jpg

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the […]

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

android_malware_400.jpg

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones […]

Alert: New Petya Ransomware Spreads via Fake Online Resumes

ransomware_petya_400.jpg

Next time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya. Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen […]

Do You Use Steam for PC Gaming? Watch Out for this New Malware!

steam_malware_problems_400.jpg

Malware has traditionally targeted industries that are exceptionally profitable. For example, hackers like to target retailers for their wealth of financial credentials. One of the most profitable industries, entertainment, is also subject to similar torment, including Steam, the PC gamer’s most valuable tool for gaming binges. Steam is a web-based distribution platform developed by Valve […]

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpg

There’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, […]

The Wolfman is an Executable Virus and 3 Other Monster/Malware Comparisons

b2ap3_thumbnail_fight_night_it_400.jpg

It’s the time of year when we reflect on scary things. For an IT company, it doesn’t get much scarier than an organization’s network getting slammed with a malicious computer virus. There are a variety of really bad viruses out there, each one with its own unique ability to cause some scary results. The way […]

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpg

Can you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a […]

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpg

You might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network. […]

Understanding How Advanced Malware Can Harm Your Business

b2ap3_thumbnail_advanced_malware_400.jpg

There are a lot of different threats out there: Viruses, malware, spyware, adware, the list goes on. While all of these threats are certainly problematic, some are more dangerous than others. In particular, advanced malware can be exceptionally devastating if they manage to inflict damage on your technology. However, what makes advanced malware so much […]

Are Your Employees Watching Porn At Work?

b2ap3_thumbnail_watching_from_work_400.jpg

Here’s a statistic that’s going to shock business owners. We hope you’re sitting down for this because we were blown away when we first heard it. Did you know that 70 percent of all online porn access happens during business hours? What does this mean for your company? One thing that we hope this doesn’t […]