The long tail of phishing attacks

                Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root …

5 Ways to Protect Against Ransomware

Follow these tips to protect your Windows environments from malicious malware. Anti-malware protection, software updates and properly tested backups are all ­important in the fight against ransomware. Here …

How to Protect Yourself After a Data Breach

Clothing retailer Forever 21 has joined the long list of companies that have experienced a credit card data breach. The company announced Tuesday that an unauthorized party was able …

Cash Converters reveals customer data breach

  High Street pawnbroker Cash Converters has warned customers about a data breach on its website. The company said customer usernames, passwords and addresses had potentially been accessed …

What does modern SMB cybersecurity entail?

Modern SMB cybersecurity increasingly involves managed detection and response services, improved zero-day attack spotting and better management of connected devices. with increased risks from ransomware and malware, an …

Apple FaceID Tricked With $150 Mask

  Security researchers have broken Apple’s FaceID security system using a mask they said takes around a few days to make and costs only $150. The authors of …