iPhone security impenetrable no more

Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement. iPhone vulnerabilities leaked, is it true? A couple […]

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against […]

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you. Why auto-fill passwords […]

It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment. See for yourself! Small businesses love […]

What you need to know about VPNs

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities. You need a Virtual Private Network (VPN). What is VPN? Simply put, […]

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims’ data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims. Let’s discuss how it works and what you can do to prevent […]

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]

Malware targeting MacOS steals bank logins

Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers. Take a minute to find out how it works so you can avoid making a costly mistake. OSX.Dok […]

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization. US government approved The NSA maintains […]