

Phishing on the Job.
Phishing at work isn’t as fun as it sounds. It’s a pretty common method in which somebody attempts to get personal information through a...

Web Security Gets a Much Needed Upgrade
Transport Layer Security, or TLS, is an internet security protocol in which the client (user) and server securely communicate with one...


Google Strengthens Their Fight Against Phishing Efforts
Google is now applying machine learning to threat indicators and advancing models to identify phishing attacks. They announced...


Brute-Force Attacking and How to Help Stop It.
In the field of cryptography, brute-force attacking is a method to discover an unknown password. It consists of an attacker trying the...


You Could Be Unknowingly Mining for Cryptocurrencies.
The new hyped theory of cryptocurrencies are digital forms of currency that aren’t printed or backed by some tangible, precious metal,...

Crypto-Viruses: Why Off-Site Backups Are Essential to Any Business.
A crypto-virus is a type of ransomware that attacks data at its source by encrypting important computer files to prevent them from...

Cover up Your Laptop Cameras! Somebody Is Watching!
No, not really. But paranoia is certainly alive and well. I’m writing this very important piece after having been exposed to a...


We May Have to Wait Longer for an Intel Patch to Fix Spectre and Meltdown
According to recent updates on the newest CPU patches for the security issues associated with Intel chips, some are either too taxing on...


Two-Factor Authentication (2FA) Protects Your Accounts from Being Hacked.
Two-Factor Authentication, or 2FA, is simply the amount of different ways you authenticate yourself upon logging into a device, account,...


Antivirus Software and Endpoint Security. What Is the Difference and Why Do We Care?
The strange world of computer viruses and malicious online threats are constantly evolving and becoming more severe. With new malware...