Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful.
4 BYOD security risks you should prepare for
Why businesses need web monitoring
The internet is indispensable for improving business productivity, but it’s also an outlet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. Fortunately, web monitoring can ensure your employees don’t overuse non-work-related sites.
Malware strain infects 200k more devices
Yet another global malware infection has been making headlines and the story just took a turn for the worse. When the news of VPNFilter broke, experts warned that 500,000 devices were already infected, but now they believe that number is much higher.
Should you worry about the new IoT malware?
A malware infection is one of the worst things that could happen to your Internet of Things (IoT) devices. But some users don’t even know there are IoT-targeted attacks that threaten computers, networks, and data. Rebooting an IoT device is a simple way to remove malware, but for those already infected with the latest strain, it’s not that simple.
New malware infects SOHO routers worldwide
Talos recently warned that at least half a million routers have been endangered by a new form of malware called VPNFilter. After an earlier version targeted devices in Ukraine, VPNFilter has spread rapidly in around 54 countries, affecting home and small business routers.
New scam freezes Chrome to panic users
Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen.
Beware of a new Locky-type ransomware
Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.
Know these types of malware to stay protected
Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.
Nyetya ransomware: what you need to know
Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations.
How did WannaCry spread so far?
By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.