customisable counter

New phishing protection for Gmail on Android

New phishing protection for Gmail on Android

One of the most common ways hackers infiltrate networks is by using phishing scams — fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method. To blunt the potency of these scams, Google released […]

The cloud is more secure than you think

The cloud is more secure than you think

Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, take a minute to learn […]

Malware on Android smartphones

Malware on Android smartphones

The average smartphone user doesn’t give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone’s physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops particularly for business users, but […]

Is fileless malware a threat to you?

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Vulnerabilities on WordPress websites

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

Browsers leak sensitive info to hackers

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, […]

Flaw allows thieves to open locked iPads

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular tablets, you need to know […]

Gooligan malware wreaks havoc on Android

Gooligan malware wreaks havoc on Android

Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to glean info, but rather to […]