The Ransomware Removal Handbook: Dealing with common strains of ransomware
By in Information Security, on August 26, 2018 at 7:17 pm
The Ransomware Removal Handbook: Dealing with common strains of ransomware

Ransomware is a growing danger for individuals and businesses. The good news is that Ransomware removal is possible. Our guide will tell you how.

Cyber security and remote working: What are the risks and how can you mitigate them?
By in Information Security, on August 7, 2018 at 5:53 pm
Cyber security and remote working: What are the risks and how can you mitigate them?

The issue of security and remote working can be a headache for digital workers and their employers. Here we investigate risks and solutions.

What is Vishing (with example scams) and how to recognize and avoid it
By in Information Security, on July 24, 2018 at 9:40 am
What is Vishing (with example scams) and how to recognize and avoid it

Are you getting suspicious spam phone calls? You could be a target for voice phishing, also known as vishing. Here’s a guide on how to avoid vishing scams.

Did USB fans given to journalists at Trump-Kim Summit contain spyware?
By in Information Security, on July 3, 2018 at 2:51 pm
Did USB fans given to journalists at Trump-Kim Summit contain spyware?

Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect devices with malware. We got our hands on one to find out.

How to securely erase external hard drives, SD cards, or flash drives
By in Information Security, on June 21, 2018 at 1:01 pm
How to securely erase external hard drives, SD cards, or flash drives

Learn how to securely erase external storage devices, like SD cards, USB sticks, or flash drives using apps for various operating systems.

What is packet sniffing and how can you avoid it?
By in Information Security, on June 20, 2018 at 4:01 pm
What is packet sniffing and how can you avoid it?

Your internet traffic is susceptible to packet sniffing and analysis as it travels through various routers en-route to its destination. We explain how to avoid that.

What is W2 phishing?
By in Information Security, on June 11, 2018 at 10:41 am
What is W2 phishing?

Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attack tries to access a company’s W2 files for all current and/or past employees.

Fileless malware attacks explained (with examples)
By in Information Security, on June 11, 2018 at 7:56 am
Fileless malware attacks explained (with examples)

Malware is malicious software that acts counter to the interests of the computer that hosts it. Viruses, worms, and Trojans are all types of malware. The standard way that a device gets infected by malware is through an executable program copied onto the victim’s machine.

5 courses to learn ethical hacking online
By in Information Security, on June 11, 2018 at 7:44 am
5 courses to learn ethical hacking online

Jumpstart your cybersecurity career with an online ethical hacking course. Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers.

What is whaling and how can you spot and avoid it
By in Information Security, on June 6, 2018 at 11:00 am
What is whaling and how can you spot and avoid it

Whaling is a form of phishing. In fact, is it a form of spear phishing. Phishing is an online scam that aims to reap private information from members of the general public, particularly login details for email, payment, and banking applications.

Page 2 of 11