Nastiest Malware 2020
greenkey2020-12-16T13:06:07+11:00As we see the end of 2020 fast approaching, it has come to that time again when we look back on the year that was in terms of cyber >>
As we see the end of 2020 fast approaching, it has come to that time again when we look back on the year that was in terms of cyber >>
Warning! The Identity Director at Microsoft Alex Weinert has been cautioning us since last year about the inadequacy of passwords. He warns us that “Your Pa$$word doesn't matter,” telling us his reasons that even the “strong” ones aren’t guaranteed to be effective. His >>
Who would have thought back in 2010 threat actors would be attacking small businesses? “But it’s happening now, “says George Anderson, the product marketing director at Carbonite + Webroot, >>
The festive season 2020: How to shop safely online Thanks to COVID-19 the Festive Season promises to be somewhat different to what we’ve been used to. Afterall we’re used to >>
Not everyone is familiar with the movie Black Panther, another Marvel Comic classic. But if you are, you’ll know the tech savvy Princess Shuri has one of the most >>
False confidence, we all have some from time to time. Some people have it more than others. And we’ve all met that someone who is a bit of a >>
If COVID pandemic has you worried, then you may find the COVID cybercrime insight and statistics enough to keep you up at night with: Approximately 500,000 Zoom accounts >>
From 2019 to 2020 there has been a significant increase in the percentage of cyberattacks on cloud systems, by 250% in fact. Firstly, attacks against cloud systems mushroomed at >>
Here's what to look out for as file-encrypting ransomware attacks can take months of planning by cybercriminal gangs. According to one estimate, everyday there are as many as 100 >>
Application Guard for Office is the new up and coming security technology from Microsoft. And Microsoft are giving the public a seek preview, as they edge closer to general availability of >>
Before you look at buying cybersecurity insurance that insures against hackers and ransomware that could possibly help you recover quicker. There are some questions that need to be answers >>
New research shows that most victims of phishing experience a fraudulent transaction around 5 days after getting phished. A group of security researchers from companies such as Google, Paypal, >>
By taking advantage of common security vulnerabilities crooks almost got a big payday as a food and drink manufacturer fell victim to a ransomware attack. But crucially the targeted >>
In as little as half an hour, hackers can exploit two security failings and gain access to your internal networks! Positive Technologies, a leading vulnerability assessment, compliance management, and >>
Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services JULY 28, 2020: Rock IT has once again been named as one of the world’s >>
It’s hard to believe that Ransomware has been around for well over 30 years. So while it’s new term for some, for large and small business it should hardly >>
Ransomware, it's a brutally simple idea but turning out to be the defining online security issue of our era. And it’s executed with increasing sophistication by criminal groups who understand >>
You’ve heard the term Malware before, and you know it’s not a good thing for your computer, right? But is it the same as having a virus? Are malware and >>
Helping over 4 million victims of ransomware attacks avoid over 600 million pounds in ransom demands since it’s launch 4 years ago, is the No More Ransom initiative. No More Ransom was started >>
In their quest for data theft, QBot Trojan operators have had a change of tactics to hijack legitimate emailed conversations. During which these operators are looking to steal credentials and >>
Thomas Read, a self-trained Apple security expert who also had a Mac before it was cool to have one, receive a message from a Twitter user going by the name >>
With prominent figures including Biden, Musk, Obama, Kanye West and Bill Gates Twitter accounts recently being hacked, will Twitter move to physical tokens for security? Certainly, to make sure their >>
As some countries start easing up their pandemic restrictions and life returns to a new kind of normal, post COVID-19, we find ourselves on the verge of more change. And >>
If the teams responsible for the security had a better understanding of their own networks, cyberattacks could be stopped before they have any impact on critical national infrastructure and >>
Showing us just how criminals gain access to a network and deploy ransomware, security researchers have revealed a close examination of a ransomware attack. These attackers can gain access >>