Disabling AutoRun Helps Prevent Malware
The AutoRun feature in Home windows for thumb and other lightweight storage devices is a double-edged sword. Whilst making file…
Public Hotspot Security Tips
Connecting to wireless hotspots is common nowadays as people travel more, use more portable devices, and are allowed the freedom…
The Conference Room Walls Have Ears
In today’s corporate environment, it’s not enough to be available to your colleagues and customers 24/7 – they want to…
Don’t be Fooled by Phone Support Scammers
A new scam is preying on the uninformed to steal from them valuable information over the phone. Read on to…
New Banking Hack Talks While Robs
Fresh Banking Hack Talks Although Robs One of the enemies from the IT office is the hacker. Cyber-terrorist have always…
Cybercrime: The Current Trends
“Cybercrime,” “malware,” “hackers.” Three common buzzwords that have caused businesses untold amounts of lost profits, breached data and so on….
Risks of P2P and Cloud Storage
Peer-to-peer networking (P2P) and cloud storage services have both been hot topics in the news lately. Whether it’s about the…
650,000 Macs Infected by Trojan
One selling point of the Mac is that the OS, OSX, is more secure than a computer running Windows. Many…
Security threats come from inside
It’s common to see companies showing confidence in their security systems. Their networks are protected from external threats, which can…
FBI to pull plug on DNSChanger
The Internet has become one of the most important tools in our personal and professional lives. It’s hard to imagine…
Watch out! Facebook used to spread worms
Facebook is Spreading Worms, Look Out! The security of a network and the systems within it is top of mind…
LinkedIn springs a password leak
Business owners often have multiple accounts with many different websites and Web services. There’s one element that links them all…