Spyware/Malware

Spyware Cyber Security Digital Identity Protection

How To Find And Remove Spyware From Your Phone

Learn how to boost your mobile security and protect your digital identity. This tech blog will run through different forms of malicious software on your iOS or Android handset, the warning signs of a spywa...

Screen Shot 2021-09-21 at 11.04.27 AM

A Guide to the Various Types of Malware

Malware typically refers to malicious software comprised of worms, viruses, Trojans, and several other harmful programs. Hackers and spammers use Malware to damage your data and gain access to your confidential...

This Windows and Linux malware does everything it can to stay on your network

Microsoft has continued its analysis of the LemonDuck coin-mining malware which has been crafted by some very determined, financially motivated cybercriminals. LemonDuck is known for install...

Screen Shot 2021-08-02 at 10.45.57 AM

‘Praying Mantis’ threat actor targeting Windows internet-facing servers with malware

Windows internet-facing servers are being targeted by a new threat actor found by the Sygnia Incident Response team. The advanced and persistent threat which they call the ‘Praying Mantis’ is operating almost c...

191715117_10158551380392758_8576857269884192316_n

Microsoft – Malware

Microsoft is warning users to watch out for a new form of malware that is capable of stealing passwords, webcam, and browser data. A remote access tool (RAT), being referred to as RevenageRAT has been flagged b...

Password Stealing Android malware

Password Stealing Android malware is spreading quickly that people need to know about. FluBot is designed to steal personal information including bank details – and infected users are being exploited to s...

COVID-19 Malware – Complete Wipe

Ran into a new malware that destroys infected systems, either by wiping files or rewriting a computer’s master boot record (MBR). This is a bad one and everyone has to be careful with they are clicking a...

US Government Bitcoin Ransomware Attack

More than 20 municipalities in the US have been hit by ransomware attacks this year alone, the software has grown rapidly by an internet worm that spreads copies of itself by hacking into other computers on a n...

Are you promoting a safe Network?

On average, organizations take about 200 days to identify new ransomware threats. In combination with aging hardware, out of date software, poor network monitoring, and lack of professional IT assistance, this ...

Shopper Safety – Beware of Fake Apps and Wifi Hotspots

Now that holiday shopping is upon us, security researchers are handing out advice on how to protect yourself and your information from cyber hacking. More and more shoppers use their smartphones while they are ...