Technology Advice for Small Businesses

How to avoid entrepreneurial hackers

Another Windows security vulnerability has been released, and it looks as though it will be only a few weeks before the next one arrives. How do we know this? Because a group of hackers are openly selling their secrets to whoever will pay. Read on to learn how to protect yourself from this dangerous group… Continue reading How to avoid entrepreneurial hackers

Who are the ShadowBrokers?

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers?… Continue reading Who are the ShadowBrokers?

Ransomware is coming to your Android

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware… Continue reading Ransomware is coming to your Android

Android users beware: Ransomware is coming

You are probably familiar with desktop-based ransomware like Petya, WannaCry, CryptoWall, and CryptoLocker. But mobile ransomware is an emerging trend you don’t want to learn about only after it strikes. Take a minute to read our summary of mobile ransomware and some easy prevention tips. How does ransomware make it onto your Android device? Like… Continue reading Android users beware: Ransomware is coming

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims’ data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims. Let’s discuss how it works and what you can do to prevent… Continue reading Ransomware targets Android devices

Ransomware targets healthcare again

In the world of cybersecurity, there’s no time to rest. Hackers are constantly developing malware, and reusing attacks that were successful in the past. Recently, hackers have revived the Locky ransomware, and it has already infected thousands of computers worldwide. If you want to keep your healthcare practice safe, read on. Using old tricks The… Continue reading Ransomware targets healthcare again

Get ready for the next wave of ransomware

The WannaCry and Petya ransomware attacks were a huge wakeup call for healthcare organizations to update their security software. Unfortunately, hackers evolve at an incredible rate, and they’ve developed a new ‘Locky-like’ ransomware strain that can catch many in the healthcare industry off guard. Using old tricks The new ransomware strain, known as ‘IKARUSdilapidated,’ behaves… Continue reading Get ready for the next wave of ransomware

Watch out! More ransomware attacks incoming

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks. Using old tricks The new ransomware strain,… Continue reading Watch out! More ransomware attacks incoming

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. Quick facts According to… Continue reading New Locky ransomware: what you need to know

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started… Continue reading Locky-type ransomware is attacking systems