When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes.
Phishers use encrypted sites to scam
A keylogger found in HP laptops
You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are -- if the computer you’re using doesn’t have a keylogger installed.
Key points from Protenus’ new report!
Security breaches are becoming an all-too-common occurrence in the healthcare industry. Due to a sever lack of competent security measures to protect extremely vital patient records, healthcare organizations have become a prime target for hackers and malicious insiders alike.
Watch out! More ransomware attacks incoming
In the world of cybersecurity, there’s no time to rest. Hackers are constantly developing malware, and reusing attacks that were successful in the past. Recently, hackers have revived the Locky ransomware, and it has already infected thousands of computers worldwide.
What you need to know about malware
Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.
Why Nyetya is more threatening than WannaCry
The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.
Firmware: the threat most users overlook
As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack.
Are your printers safe?
Do you have security measures in place for your office’s printers? By “security,” we don't mean locked doors or watchful guards; we're referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices.
3 Reminders for HIPAA compliance in 2017
Although totally necessary, data privacy regulations are often a gigantic headache. And king among the various compliance standards is HIPAA. Despite the legislation’s enactment back in 2003, the rules governing electronic medical records and protected health information continue to change and evolve every year.
Ransomware demands more victims for freedom
Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need.
- 1
- 2