Tag: Virus

25
Aug

What Is Spyware And How Does It Work?

Written by: Jay H. Spyware is an umbrella term for a form of malware (malicious software) that bad actors install on a victim’s computer without their consent. It then spies on the user, steals personal information – including browsing history, login information, and sensitive information – and relays the data to third parties. Spyware is one of the most common

Read more

28
Jun

Brute Force Attacks, Software Vulnerabilities, And Malicious Emails Behind Most Attacks

Written by: Jay H. Cyber attackers are successfully breaching organizations through brute force attacks, software vulnerabilities, and malicious emails, according to a new report from Kaspersky. Almost 90 percent of the incidents Kaspersky’s team responded to involved these three factors, providing insight into which attack vectors hackers are successfully using. Brute force attacks and software vulnerabilities each accounted for 31.58

Read more

8
Jun

How Your Remote Employees Could Be Threatening Your Business

Written by: Jay H. Cybersecurity is critical for your business operations. Without proper procedures in place, you risk exposure to costly ransomware, data theft, and data loss. However, while most worry about external bad actors threatening their organization, your employees could be posing just as big of a risk. A new survey by HP Wolf Security found that many remote

Read more

13
Apr

Hackers Still Exploiting Years-Old Vulnerabilities

Written by: Jay H. If it’s not broken, why fix it? That’s certainly the attitude of many hackers, who are successfully exploiting software vulnerabilities that are several years old and have security updates long available. These attackers then deploy ransomware on victim businesses ‘ networks, encrypting their data, and halting business operations. Researchers at Qualys analyzed the most common Critical Vulnerabilities

Read more

8
Apr

Ransomware: Under Half Of Companies That Pay Ransom Recover Data

Written by: Jay H. Ransomware is every organization’s worst nightmare. A new study from Telus unveils how ransomware is impacting Canadian businesses and how firms can protect themselves from this ever-evolving threat. The survey included 463 responses from key decision-makers in Canadian businesses. While the study encompassed all industry verticals, there was a particular focus on eight sectors: financial services,

Read more

2
Apr

How To Secure Your Mobile Phone

  Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your

Read more

28
Mar

Scammers Steal $80 Million Per Month Through Fake Giveaways, Surveys

Written by: Jay H. Scammers successfully steal $80 million per month through fake giveaways and surveys, a new report from Group-IB finds. Fraudsters targeting victims in over 90 countries worldwide, including Canada, the United States, Italy, and South Korea, impersonate popular brands to steal users’ personal and payment data. An estimated 10 million people are victims of a single scam

Read more

15
Dec

FBI: Ransomware Targeting Food & Agriculture Sector

Written by: Jay H. The US Federal Bureau of Investigation has warned that cybercriminals are targeting the food and agriculture sector with ransomware attacks. According to the notification, threat actors are turning their attention to the food and agriculture industry because of its increasing reliance on smart tech. These attacks are disrupting operations, causing financial loss, and negatively impacting the food

Read more

16
Sep

What Is A Botnet And How Does It Work?

Written by: Jay H. Botnets are an extensive network of PCs infected with malware controlled remotely by an attacker, known as the “bot-herder.” Think of a robot army under the control of its master. Each machine under the control of the bot-herder is known as a bot. From the attacker’s centralized position, they can easily command every computer in the

Read more

12
Jul

The Most Common Types Of Cyberattacks

  Written by: Jay H. A cyberattack is an attack on the information system of an organization or individual. Usually, cybercriminals leverage these attacks to exploit sensitive information or otherwise disrupt operations. Cyberattacks impact businesses every day. Indeed, cybercriminals attack every 39 seconds, underscoring how important good cybersecurity defence is for organizations. Here are the most common types of cyberattacks

Read more