Patch Management

Ticketfly Data Breach Means Music Fans Need to Go Elsewhere for Tickets

Summer has yet to officially start, but to me it feels like it’s begun already. My hometown of Toronto has been experiencing sweltering temperatures for…

Happy Donut Day!

It’s June 1st, so have a happy Donut Day! Your IT staff works hard all year. Perhaps you should consider bringing in a box of…

malware attacks

Tension Between Donald Trump and North Korea Coincides with Malware Spikes

Talks of Korean reunification have made me feel very optimistic. The Korean War has had a devastating effect on Koreans on both sides of the…

Phishing Email

Phishing Trap for Microsoft Users | Phishing Attacks – Comodo

Phishing trap for One Drive users. How to avoid falling prey? Cybercriminals often use very cunning and inventive tricks to manipulate victim’s mind in phishing…

Chrome Extentsion

Facebook Distributed Trojan Targets Cryptocurrency

Do you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a wallet? Would you install something…

phishing email

Password Stealer Hides In The Payment File And Hunts For Credentials

Cybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the victim, use social engineering techniques…

Website Security check

Website Security Checklist of 2018

Protect Your Website Against Security Threats Criminals follow money. Now that money has gone digital, it’s only natural that criminals have shifted their gaze to…

email security

How to Choose your Antispam Software

The ages when spam emails were easily spotted and the risks were not high are gone. In the current age of cyber crime, spam emails…

Cyber Security

Here’s What I Learned at RSAC 2018

The RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but most of my colleagues were.…

identity theft attack

Massive identity theft attack stroke at universities from IP of … Brazilian law enforcement agency

Cybercriminals not only steal credentials or infect computers with malware. They also hunt for users’ personal data, including passports and IDs, physical addresses, phone numbers…

X