Top 10 Holiday Scams

, , ,
The holiday season is finally upon us! It’s time to roll out the holly, spread some joy, and give thanks by enriching our loved ones with gifts galore. But wait, not everyone wants to spread good cheer. In fact, this is exactly the time…

Four Threats that Attack Mobile Devices

, , ,
We are all aware that cyber threats such as viruses, malware, and phishing poses danger to our desktop computers. However, mobile devices have become a real target for hackers. A study by Network World shows that the average American touches…

Top 25 Most Popular (and Worst) Passwords

, , ,
Every year, SplashData - a Los Gatos, CA security applications and services provider, compiles a list of stolen passwords that are made public and sorts them in order of popularity. Below are the top 25 passwords of shame – brace yourselves.   …

Phishing Scams - Identifying Types and How to Prevent an Attack

, , ,
The Evolution: From Phish to Whale The continuing surge of phishing scams has been keeping businesses on their toes when it comes to safely operating their email accounts. The term, to phish, refers to attackers luring targets with bait via…

Ransomware - Identifying Types and Degrees of this Malware

, ,
Ransomware - This is your Nightmare You spent the last few weeks working on a critical report for your supervisor. You’ve researched, edited, and proofread it dozens of times, and have also passed it onto colleagues for review. You have…