You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.  However, that’s not …

Most Travelers Are Oblivious To Security Risks During Travel

Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a grim reality that could put your company and its data …

Survey Finds Employees Aren’t Improving Internal Security Practices

SailPoint has recently published some new research that will probably give you a headache, if you’re a business owner. It’s been common knowledge for at least a few years now that employees are a company’s weakest link when it comes to data security.  From weak passwords, to using the same password across multiple web properties, to a general lack of …

How Long Before You Experience A Cyber Attack?

According to this year’s Traveler’s Risk Index, published by The Traveler’s Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 percent of survey respondents indicating that they believe a cyber-attack is inevitable. The other statistics in the report paint a grim picture.  Here’s a quick overview: 55 percent …

An Exploited Website Can Cause Apple Products To Crash

Users of Apple tech have a new reason to worry.  A security researcher named Sabri Haddouche, who works for an instant messaging app called “Wire,” has published a proof of concept web page. It contains a fatal exploit that can crash and restart iPhones, iPads and any Mac. Essentially then, the entire Apple ecosystem is vulnerable.  Worse, the security flaw …

Popular NAS Device May Easily Be Compromised

Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too.  The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of course, access their data from anywhere in the world. Recently, …

Malware Reports Continue To Rise 

We’ve known for some time now that the next big crisis the internet will have to come to grips with is the dramatic rise of the Internet of Things (IOT). The problem isn’t with the devices themselves, which are enormously helpful and rapidly growing in their popularity.  Rather, it lies in the fact that the overwhelming majority of IoT manufacturers …

Your Business Email Is Highly Targeted For Attacks

There’s a new report out, authored by ProofPoint, and its findings for business are grim. It’s no secret that businesses of all shapes and sizes are coming under increasing fire from hackers around the world. Now we have hard data that shows us exactly how big of an increase we’re seeing. Here are some of the key findings in the …

Tech Support Scammers Are Advertising Online 

Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which allows them to insert phone numbers into web pages dynamically. …