New ransomware demands sacrifice

New ransomware demands sacrifice

It’s scary to think you can be simply browsing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there’s a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely.

Gooligan virus attacks Android users

Gooligan virus attacks Android users

If you own an older Android, you might have already experienced the impact of the Gooligan Malware virus. Since August, the infection has struck an estimated 1.3 million Android phones, and it shows no signs of stopping. For those unaware of the Gooligan strain, here are a few key details you need to know right away.

Android malware affecting Google Play

Android malware affecting Google Play

A new Android malware is attacking sensitive files at some of the largest corporations in the U.S. and Europe. Companies that use BYOD programs are particularly vulnerable to infection of the malware, which comes from the DressCode family. Find out more about this malicious malware and how you can protect yourself from it.

Increase productivity with web monitoring

Increase productivity with web monitoring

With YouTube, Reddit, and Instagram just a few clicks away, it’s a miracle you can get anything done during an eight-hour workday. As you’re probably well aware by now, there is a huge possibility for employees to waste precious time on sites not related to your business.

IT jargon: a glossary of cybersecurity terms

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.

4 Security risks to consider with BYOD

4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly.

Is your computer infected with malware?

Is your computer infected with malware?

Has your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system.

This Android malware that can wipe your phone

This Android malware that can wipe your phone

When it comes to your technology, you have enough to worry about. New cyber threats appear in the news every day. And while you’re likely doing your best to keep your business protected, you may not think twice about the security of your phone. And why should you? Well, if you’re an Android user there’s a new malware that has the ability to wipe out all your personal data on your phone.

Scareware alert for Mac users

Scareware alert for Mac users

Just when you thought it was safe to surf the Internet waves on your Mac computer…if malware could have a catchphrase, this play on the classic Jaws 2 tagline would be quite fitting for a recently discovered scareware. It’s sneakier and more convincing than almost anything that’s come before.

Chimera ransomware: what to know

Chimera ransomware: what to know

You are probably already familiar with ransomware, one of the nastier forms of malicious software that does the rounds every now and again, but what you may not already be acquainted with is a ransomware program called Chimera. Only recently discovered, Chimera’s creators have taken the already unpleasant ransomware program’s scare tactics to the next level.