How Long Before You Experience A Cyber Attack?

According to this year’s Traveler’s Risk Index, published by The Traveler’s Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 percent of survey respondents indicating that they believe a cyber-attack is inevitable. The other statistics in the report …

An Exploited Website Can Cause Apple Products To Crash

Users of Apple tech have a new reason to worry.  A security researcher named Sabri Haddouche, who works for an instant messaging app called “Wire,” has published a proof of concept web page. It contains a fatal exploit that can crash and restart iPhones, iPads and any Mac. Essentially then, …

Popular NAS Device May Easily Be Compromised

Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too.  The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of …

Malware Reports Continue To Rise 

We’ve known for some time now that the next big crisis the internet will have to come to grips with is the dramatic rise of the Internet of Things (IOT). The problem isn’t with the devices themselves, which are enormously helpful and rapidly growing in their popularity.  Rather, it lies …

Your Business Email Is Highly Targeted For Attacks

There’s a new report out, authored by ProofPoint, and its findings for business are grim. It’s no secret that businesses of all shapes and sizes are coming under increasing fire from hackers around the world. Now we have hard data that shows us exactly how big of an increase we’re …

Tech Support Scammers Are Advertising Online 

Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …

Hacker Requests For Wire Transfers Are Topping Email Scams

Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …

Most Small Businesses Can’t Recover From Cyber Breaches

A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …