A primer on watering hole attacks

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through […]

Tips for safeguarding business data

Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any […]

What makes hypervisors weak?

The efficiency of hypervisors against cyberattacks has earned them a reputation as a reliable and robust software application. But the persistence of hackers who never run out of creative ways to breach systems keeps IT experts on their toes. You should know the vulnerabilities of hypervisors so you can defend them properly and keep hackers […]

Android phones miss vital security patches

Watch out Android users, your smartphone may not be as secure as you thought it was. A study has found that a few Android manufacturers may have accidentally skipped crucial software updates despite saying they constantly keep their products up to date. Here’s a quick rundown. Missed patches Every month, Google rolls out a new […]

Beware of watering hole attacks!

When talking about cyberattacks, the first one that usually comes to mind is phishing, a scam that uses email to spread malware or steal personal information. But hackers have a new method to infiltrate your systems, and it’s surprisingly effective. Here’s what you need to know about watering hole attacks. What are watering hole attacks? […]

5 Android changes to look forward to

Before releasing new features for public use, Google previews their products to businesses and early adopters. Recently, the company unveiled an early version of Android P, and the new features are already turning heads. Let’s take a closer look at the big changes. Indoor positioning If you’re having trouble finding your way around a huge […]

Hypervisor security vulnerabilities

The virtualization trend is still going strong, offering businesses streamlined resource management and massive cost-saving potential, but just like every technology, it has its fair share of security risks. In fact, a virtualization solution is only as secure as the hypervisors that support it. What is a hypervisor and what are its risks? For those […]

Office 365 Update: New Tools You Need To Know

Enriching Office 365 with more everyday AI functionalities, Microsoft has introduced ‘Insights Preview’ to MS Excel, ‘Acronyms’ feature for MS Word, and a Text-in-image search feature to help its users to do their best work. Learn more about the recent upgrades to Office 365 products and the new Microsoft Whiteboard Preview app in this article. […]

Update your Mac ASAP

Apple cyber incidents have increased steadily over the past few months. In 2017, we’ve witnessed several Mac ransomware strains and a host of other computer viruses. Recently, Apple discovered a major security flaw with macOS High Sierra. Read on to find out more. Serious bug On November 28th, security researchers reported a serious bug in […]

How fulfilling is Android’s new Oreo

After months of teasing, Google has finally unveiled the next iteration of its mobile operating system: Android Oreo. Much like previous versions, users can expect faster delivery, smoother experiences, and plenty of cool new functionality. While Android Oreo is still in its beta phase, it already has a long lineup of features that users will […]