How Nonprofits And Associations Can Prevent Ransomware Like WannaCry

How Nonprofits And Associations Can Prevent Ransomware Like WannaCry

On Friday May 11, 2017, the world learned just how vulnerable computer networks can be when not fully protected as it experienced a well-coordinated ransomware attack, known as WannaCrypt, or WannaCry. Note: Ransomware encrypts files and makes them unusable unless payment (ransom) is made within a specified time. Malware and ransomware like WannaCry prey on […]

Share

Mobile App Permissions: Are Users Really the Problem?

Mobile App Permissions: Are Users Really the Problem?

While there have been a lot of news-worthy events in the past couple of years involving corporate breaches, one thing has not changed. Users are still considered the greatest obstacle to information security. Whether it is phishing, opening infected attachments, or “just being stupid and lazy”. Our focus in this article will be on the […]

Share

Why Google’s Malware Bouncer Is Not Enough

Why Google’s Malware Bouncer Is Not Enough

Google recently revealed that it had a malware scanner for the Android OS that automatically scans the code of apps uploaded to the Android Market. The service, which Google gave the codename of ‘Bouncer’, is said to look for behavior that are deemed unacceptable by the company. But the problem with Android Apps go beyond […]

Share

Drive-by Trojan Download: CNET Embraces the Dark Side

Drive-by Trojan Download: CNET Embraces the Dark Side

It appears that the draw of the almighty dollar has pulled CNET to the dark side. CNET is a popular technology news site with a download portal called Download.com where many users go to download software that are free, shareware and open source. The site built a reputation a while back as a dependable location […]

Share

Try Any of Our Services for 30 Days!

Share
Share