Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds. If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking.
Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time.
When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat […]
Businesses are using mobile devices more than ever to increase productivity and profitability. However, like desktops and laptops, smartphones and tablets are highly vulnerable to hacking, and some employees expose them to threats in ways they may not even be aware of.
Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security.
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.
Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start.
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent.
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.
Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and.