Tag: Electronics

21
Apr

5 Best Video Conferencing Apps Compared

Written by: Jay H. Organizations and individuals alike have been flocking to video conferencing tools to keep in contact while working remotely. With so many video conferencing apps available, which one is most appropriate for which situation? We’ve evaluated five popular video conferencing apps: FaceTime Automatically integrated into Apple devices, FaceTime is a useful application for Apple enthusiasts. With one

Read more

17
Apr

Coronavirus: Email Phishing On The Rise

Written by: Jay H. Amongst the chaos created by the coronavirus, scammers are scheming ways to capitalize on peoples’ fears. According to security firm Barracuda Networks, the amount of coronavirus-related email phishing attacks has steadily increased since January. Also, there has been an unprecedented spike since the end of February, with a 667 percent increase in coronavirus email phishing. From

Read more

13
Apr

Report: Latest Cybersecurity Threats And How To Protect Yourself

  Written by: Jay H. Cybercriminals have been taking advantage of the coronavirus pandemic to target individuals and organizations. A report released by cybersecurity vendor Nuspire details the latest cybersecurity threats and how to protect yourself against them. Nuspire analyzed more than 90 billion traffic logs from the first quarter of 2020 and found malware, botnets, and exploits as the most

Read more

10
Apr

Zoom: Privacy and Security Issues

Written by: Jay H. The increase of remote workers and students due to the coronavirus pandemic has let the Zoom video conferencing app see a surge of users. Its simple interface has made it the default video chat platform for millions. Going from 10 million users in December to 200 million in March, Zoom is the No. 1 most downloaded

Read more

24
Mar

How Hackers Are Targeting Your Remote Workers

    Written by: Jay H. As employees move to a remote environment due to the coronavirus pandemic’s spread, cybersecurity experts say that hackers will follow them, seeking to take advantage of the disorientated workforce. Hackers are targeting remote workers through several vectors, hoping to trick employees into handing over sensitive information. These methods include: disguising their malicious software as

Read more

19
Mar

How To Spot An Email Scam (Phishing)

Written by: Jay H. Email scams (phishing) are a common tactic used by scammers to install malware on a victim’s computer or access sensitive information such as passwords, usernames, and credit cards and banking information. Although some email scams are quite obvious to spot, others can be well-disguised by scammers to look legitimate. Here are some easy ways to spot

Read more

2
Mar

4 Cybersecurity Threats Of 2020

Written by: Jay H. Cybercriminals use several tactics to threaten an organization’s cybersecurity, and the costs can be catastrophic. In 2019, $2 trillion in losses was attributed to cybercrimes, and by 2021, that number is expected to rise to $6 trillion. Alarmingly, around 60% of companies face cyber-attacks, including DDoS, phishing, and social engineering attacks. In 2020, organizations face various

Read more