Predicting cyber-threats in 2017

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night.

iPhone video bug crashes Apple devices

Apple iOS users beware — there’s a five-second video that can harm your iPhone. In late November, the brief MP4 clip seemed innocent enough. But after iPhone users played the video, their iPhones began to slow down and eventually crash. Details of the iPhone-killing bug are still being investigated, but here’s what we know so […]

Potential security breach for Android users

Android users may have reason for concern regarding their device security as well as the information transmitted by their phones. A backdoor security breach has recently been identified in Android devices that could cause user data to be sent to China. Because of the major risks that this security breach poses, it is important for […]

Social engineering and cyber security

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about […]

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come […]

SMBs turn to hybrid clouds for flexibility

Who would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, “cloud” computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to […]

WordPress 4.5.3 fixes several security bugs

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, […]

Microsoft Office 365 ravaged by ransomware

The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad – some utilize their skills in committing cyber crimes from the comfort of their own homes.