If you own an older Android, you might have already experienced the impact of the Gooligan Malware virus. Since August, the infection has struck an estimated 1.3 million Android phones, and it shows no signs of stopping. For those unaware of the Gooligan strain, here are a few key details you need to know right away.
The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.
Although iPhone bugs and malware are typically unheard of, there’s one circulating the web that you should be aware of right now. The bug, which was discovered in Reddit, is a brief, five-second video that when played causes your iPhone to freeze and ultimately crash.
An issue has recently been identified with Android devices that may put users at risk of being exposed to a massive data security breach. A backdoor in Android devices and operating software makes it possible for personal data to be transmitted and viewed by people in China.
The new features recently unveiled by Office 365 promise to bring business owners to a more secure and knowledgeable position in which to make important decisions regarding the future of their corporation. Microsoft expanded the popular program’s basic scope to include data protection and productivity tools, including the replacement of Delve Analytics with the MyAnalytics add-on.
When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people.
The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.
Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.
Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case.
Is being responsible for electronic medical records a daily source of trepidation for you or your business? While the sentiment is understandable, it often results from a lack of understanding about what HIPAA compliance actually means. As industry-wide penalties continue to rise every year, it’s essential to take a closer look at who is being fined, and why.