Attackers Are Exploiting a New Adobe Flash Zero-Day Vulnerability
Adobe announced it will soon issue an update for its Flash Player in response to the discovery of critical vulnerability CVE-2016-1019, which is currently being exploited in the wild. According to...
View ArticleHow Do Firewalls Prevent Computer Viruses?
You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber criminals. But that doesn’t mean you know how a firewall actually works, does it?Don’t worry—the truth is...
View ArticleWhat is What is Grayware, Adware, and Madware?
If you’re like most Internet users, you’ve never even heard of grayware, adware or madware. That’s because these are all lower on the threat scale in the world of malicious programming. What’s more,...
View ArticleMagnitude and Nuclear EKs Target New Adobe Flash Player Exploit
Adobe has released a patch for a newly discovered vulnerability CVE-2016-1019, which affects Adobe Flash Player. It has been found that two separate exploit kits known as “Magnitude and Nuclear” have...
View ArticleWhat To Do When You Fall For An Email Scam
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves...
View ArticleHow Does Malware Get Past Security Software?
Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very...
View ArticleHow Can I Tell If I Have Malware and What Can I Do About It?
Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to...
View ArticleCritical Vulnerabilities Affecting QuickTime for Windows
Two zero-day vulnerabilities showed up recently that could spell trouble for Apple users who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
View Article10 Facts About Today's Cybersecurity Landscape That You Should Know
The cybersecurity landscape is constantly evolving with new threats and never-before-seen vulnerabilities being discovered by security experts and, just as likely, exploited by cybercriminals at a fast...
View ArticleTeach Your Kids to Avoid Online Scams
Surfing the Internet means possible exposure to online scams, something your children might not have any concept of. If you’re allowing them to go online, it’s imperative that you discuss online scams....
View ArticleThe Risks of Public Wi-Fi
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar?...
View ArticleBeautifulPeople.Com’s Ugly Data Breach
1.1 Million people are at the risk of having their private data exposed in the underground economy, also known as the Dark Web. Controversial website, BeautifulPeople.com, which claims to have “the...
View ArticleAttackers Using Phishing Apps to try to Steal Credentials to Popular Mobile...
As mobile payment platforms become more popular, scammers are taking notice to this uptick in digital currency exchange. Fake Android apps have been discovered on the Google Play Store that pose as...
View ArticleMay The Fourth Be With You
Did you know that there was more than one Death Star? What’s more, the destruction of each one of them was via one vulnerability, or weakness in the whole system. To celebrate May the Fourth we’re...
View ArticleOver 250 Million Email Credentials Retrieved in Data Breach, However, It May...
American cyber investigation company Hold Security has discovered a massive data breach of more than 250 million webmail accounts around the world.The company’s founder, Alex Holden, reportedly told...
View ArticleHow To Stay Ahead of Zero Day Vulnerabilities
Zero Day Vulnerabilities are a newly discovered software vulnerabilities that are unknown to the manufacturer. A software vulnerability is a weakness in the software where cybercriminals can sneak...
View ArticleHow a Gmail Password Stealing Scam Works
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you...
View ArticleWhat Is a VPN? And Why You Should Use a VPN on Public Wi-Fi
If you’ve ever wondered if it’s safe to use public Wi-Fi, you are not alone. In fact, according to the Norton Cybersecurity Insights Report, 6 in 10 consumers believe using public Wi-Fi is riskier than...
View Article