malware

Digging Into the Hackers Playbook for Some Solid Cybersecurity Lessons

Digging Into the Hackers Playbook for Some Solid Cybersecurity Lessons

What crosses your mind when you think about hacking attacks and data breaches? Do you picture a hacker in a ski mask typing furiously, or do you imagine scenes made memorable like those in television and film in works like Mr. Robot or Live Free or Die Hard? In the latter, hacking attacks are perpetrated by masterminds or those with grand ambition. Yet, this trend may portray an inaccurate representation of the typical hacker.

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Webcam Security: How To Protect Yourself

Webcam Security: How To Protect Yourself

Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.