Phishing scams are on the rise. Their use of social engineering techniques are making them particularly sinister and effective. The question is how to defend against these attacks. Though we may dream of a simple solution that is only a click away, there are no such solutions. Knowledge is the most important and most…

Read More

  There is nothing lucky about your machine or network receiving a ransomware infection. Not only can it be highly destructive, but the matter could have been avoided in some cases. Discovered early last year, Locky is a relatively young malware initiative coming out of Russia. We’d like to take you through what it is,…

Read More

  Sometimes particularly vicious instances of malware are remembered and named. These infectious programs have wreaked serious havoc throughout the internet, costing billions of dollars in damages and lost revenue. Today we’re going to be going over some of the most famous malicious programs to ever come across the internet and what we can learn…

Read More

  Sometimes the easiest way to get into your machine is to just ask. Phishing attacks utilize the power of social engineering to manipulate you into allowing cyber criminals to infect or infiltrate your network. These tactics are quite clever, and to combat them you need to be even more clever. Today we’re going to…

Read More

  Sometimes when people think of computer threats, they think of viruses. However, that term only covers one type of security threat that can be captured under the umbrella term, “Malware.” Malware is the word that describes all types of software whose purpose is to infiltrate and infect a host computer or network. There are…

Read More