BLOG
Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your business...
Deep Fakes are becoming an increasingly large problem. If you’re not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a video is...
Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your...
WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however...
Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have...
If you make frequent use of Adobe products, then you’ll definitely want to give priority to applying the latest security update offered by the company. It’s an out of band patch that...
A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at...
If you haven’t yet installed the latest Windows 10 or Windows Server update, here’s something to be aware of before you do. You may not be able to update or install some third-party...
Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, ‘Terminator,’ in which a computer network gained sentience and decided to do away...