New anti-phishing features for Gmail

Cybercriminals have been relentless throughout 2017. In the past couple of months, hackers discovered new malware strains and software vulnerabilities that have overwhelmed thousands of businesses worldwide. But despite these new attacks, hackers still have an old, yet effective trick up their sleeves: phishing scams.

Lessons learned from the WannaCry malware

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

Google adds phishing defenses for Android

One of the most common ways hackers infiltrate networks is by using phishing scams -- fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method.

Why you need to update Microsoft Word

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information.

Cyber-crime and social engineering

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening.

9 cybersecurity terms everyone must know

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.

Don’t let hackers fool you with these tricks

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information.