With the almost universal introduction of caller ID, choosing who and when to answer calls has become a tad bit easier. However, unfortunately, people still fall victim to vishing attacks. But what is vishing exactly? In this blog, we will explore this newfangled type of phishing while laying out some helpful ways to avoid becoming…
After the much-hyped rollout of Windows 10, there were bound to be some hiccups along the way. Well, they’ve arrived in the form of a very specific type of malware attack. Although there’s no telling how widespread the issue may be, this Windows vulnerability is affecting many users. That’s why we decided to dig a…
For a long time, people looked at Macs as the safer alternative to Windows. And for a while, that was true. However, in recent months, there’s been an uptick in malware attacks on Mac computers. With Mac malware on the rise, we look at what’s going on, as well as how we got here.
Microsoft recently discovered a new strain of fileless malware that essentially hijacks PCs and turns them into hubs for carrying out further malicious activity. Here’s what we know about Nodersok malware so far.
Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools that are already on your computer to carry out attacks. Here’s what you need to know.
Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.
While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files hostage by encrypting them. It then prompts you to pay Bitcoins to recover your files, similarly to CryptoWall.
Whether they know it or not, any person who has used a computer has been confronted with malware. But what is malware, anyway, and how can it be prevented from infecting a computer?