• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos5 Stats

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More
Kudos4 Stats

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it. Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people a...
Read More
Kudos4 Stats

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.

Read More
Kudos2 Stats

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.

Read More
Kudos0

What Are Bots?

Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over a computer. The Good One of the typical “good” bot uses is to gather information. Bots in such guises are called web crawlers. Another “good” use is automatic interaction with instant messaging, instant relay chat, or assorted other web interfaces. Dynamic interaction with websites is yet another way bots are used for positive purposes. ...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Read More
Kudos1 Stats

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks in order to infect a web browser and device. Often, it’s very difficult to distinguish between legitimate and malicious online ads.

Read More
Kudos4 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Read More
Kudos1 Stats

Ransomware- When Cybercriminals Hold Your Computer Hostage

Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key. Types of Ransomware Ransomware can present itself in two forms. Locker ransomware will encrypt the whole hard drive of the computer, essentially locking the user out of the entire system. Crypto ransomware will only encrypt specific, seemingly important files on the computer, such as word documents, PDFs and image files. Once the ransomware installs itself, ...
Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos2 Stats

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now. What can cybercriminals do with my data in the event of a banking or financial institution breach? Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos2 Stats

How to Spot a Fake Android App

Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot...
Read More