When personal and professional information live on one mobile device, a small breach can have huge impacts. As the adoption of bring your own device (BYOD) policies increase, employee awareness of cyberthreats becomes critical. Here are five tips for avoiding common Android-based security risks.
In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping.
Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual’s medical records were leaked, that could be both […]
Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever […]
“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]
As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, […]
There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims […]
Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]