Written by: Jay H. If it’s not broken, why fix it? That’s certainly the attitude of many hackers, who are successfully exploiting software vulnerabilities that are several years old and have security updates long available. These attackers then deploy ransomware on victim businesses ‘ networks, encrypting their data, and halting business operations. Researchers at Qualys analyzed the most common Critical Vulnerabilities
Written by: Jay H. Ransomware is every organization’s worst nightmare. A new study from Telus unveils how ransomware is impacting Canadian businesses and how firms can protect themselves from this ever-evolving threat. The survey included 463 responses from key decision-makers in Canadian businesses. While the study encompassed all industry verticals, there was a particular focus on eight sectors: financial services,
Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your
Written by: Jay H. Scammers successfully steal $80 million per month through fake giveaways and surveys, a new report from Group-IB finds. Fraudsters targeting victims in over 90 countries worldwide, including Canada, the United States, Italy, and South Korea, impersonate popular brands to steal users’ personal and payment data. An estimated 10 million people are victims of a single scam
Written by: Jay H. The US Federal Bureau of Investigation has warned that cybercriminals are targeting the food and agriculture sector with ransomware attacks. According to the notification, threat actors are turning their attention to the food and agriculture industry because of its increasing reliance on smart tech. These attacks are disrupting operations, causing financial loss, and negatively impacting the food
Written by: Jay H. Botnets are an extensive network of PCs infected with malware controlled remotely by an attacker, known as the “bot-herder.” Think of a robot army under the control of its master. Each machine under the control of the bot-herder is known as a bot. From the attacker’s centralized position, they can easily command every computer in the
Written by: Jay H. A cyberattack is an attack on the information system of an organization or individual. Usually, cybercriminals leverage these attacks to exploit sensitive information or otherwise disrupt operations. Cyberattacks impact businesses every day. Indeed, cybercriminals attack every 39 seconds, underscoring how important good cybersecurity defence is for organizations. Here are the most common types of cyberattacks
Written by: Jay H. According to a new report from a Canadian international managed service provider, manufactured goods producers were the biggest ransomware targets in the first half of 2021. In the recent report issued by the Herjavec Group, 39 percent of victims listed on the data leak websites run by ransomware groups broadly fell into the manufactured goods category.
Written by: Jay H. Computer viruses do more than only slow down your computer – they can impact your PC’s functions, download more malware, spread to other computers, and delete or steal your files. So, learn how to tell if your computer has a virus and how to prevent them from infecting your PC in the first place. Types Of