As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent.
This fake Google app is really a phishing scam
Beware: new Mac malware on the loose
No computer is safe from malware, not even Macs. Even though incidences of viruses and malware are rare for Apple computers, they can still occur with disastrous consequences. Based on one security software firm’s report, MacOS malware grew by 744% in 2016, but the number of attacks were still fewer than attacks on Windows computers.
How to make your business pop online
The true cost of an ugly website
Cloud security: everything you need to know
Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, take a minute to learn why the cloud your best option.
How to extend your laptop battery’s power
Whether you prefer a quick fix or a long-term solution, extending your laptop’s battery life should be among your priorities if you’re a heavy laptop user. Replacing an old battery with a new one or purchasing a new laptop shouldn’t be your only options, especially if you operate a business with limited resources.
You can now scan documents on Android
Kanye West and HIPAA: an unlikely lesson
Two trends have been rising in popularity in tandem: HIPAA compliance audits and social media. Obviously both of these are far too important to be correlated directly, but they do intersect with each other. Social media tends to push people toward oversharing, and that’s definitely something you don’t want when hosting regulated patient data.
A brief history of virtual quarantines
Five ways to avoid VoIP eavesdropping
Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever since it was introduced to the market.
