What’s new with the Chrome Cleanup tool?

Even if you’re sure that the websites you visit are safe, harmful software can still slip through, especially when you download and install free programs and applications. As the world’s most popular browser, Chrome is especially prone to infection. Fortunately, Google has improved Chrome’s Cleanup tool for Windows by integrating the following security features. Detect […]

Android 8.0: significant security upgrades

Android users will want to take a bite of the latest OS’s features, and with good reason. Oreo is packed with enhancements and add-ons, including a significant interface overhaul, a picture-in-picture mode, smart text selection, and other nifty features. In case you’ve missed the equally important security updates, we’ve listed some of the most noteworthy […]

Beware of sneaky Microsoft Office malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office. What’s the new Office threat? […]

Healthcare providers and mobile devices

If you’re a healthcare services provider who utilizes mobile devices in daily operations, you need to ensure the patient data stored and handled by those devices are safe and private. Let’s take a look at mobile data security and some of the ways you can keep your sensitive patient information secure. Why does data security […]

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

IoT security challenges for healthcare

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients. IoT security risks Devices that contain a treasure trove of patient data are […]

What are the advantages of SaaS?

Almost every business relies on software to operate, and for most SMBs, the costs of software — including license and maintenance — are painfully expensive. So is there a solution that allows you to leverage the power of software without a high price tag? One candidate is the software delivery service called SaaS. Read on […]

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of […]

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years. Fruitfly spyware […]

Quick review: why you need virtualization

With virtualization, you can make software see several separate computers where there is only one, or make several computers look like one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few. More technology uptime Virtualization vendors use lots of fancy names […]