Wi-Fi is essential in most homes these days. From streaming your entertainment and music, to making it possible to work from home, we rely on Wi-Fi for many of today’s modern conveniences. However, sometimes you just need it to stop. This is particularly true for parents since the internet can be quite distracting for kids. […]
A security researcher has found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system. Details of the exploit were released in a presentation given by Mac security specialist Patrick Wardle at the Def Con hacking conference. Some of the bugs have already been fixed […]
Streaming media platform Plex sent out an email to its customers notifying them of a security breach that may have compromised account information, including usernames, email addresses, and passwords. Plex stated, “all account passwords that could have been accessed were hashed and secured in accordance with best practices,” however they’re still advising all users to […]
Cyber security awareness: Unfortunately, small to medium sized businesses make very tempting targets for malicious hackers because they leave themselves vulnerable to cyber threats. SMBs hold the same kinds of data that large businesses have, such as personal information, credit card details, passwords, and more. However, with the nature of SMBs means the information could be […]
Our mobile devices are now the keys to our communication, finances, and social lives, making them lucrative targets for cybercriminals. Whether you use a Google Android or Apple iOS smartphone, threat actors are constantly evolving their tactics to break into them. This includes everything from basic spam and malicious links sent over social media to malware […]
Making sure that cloud services are secure is more complicated than you might think. Shifting applications and infrastructure over to cloud computing services can make life easier in some ways, it doesn’t automatically mean you can give up all responsibility for keeping your organisation’s data secure. Cloud computing continues to grow at a fantastic rate, the most […]
Keeping on top of cybersecurity risks is a constant challenge. Threats including phishing, malware and ransomware are continually evolving and adapting, as cyber criminals regularly find new, innovative ways to conduct malicious hacking campaigns, break into computer systems and find a way to stay there. Many companies are having difficulties keeping up with the technological world and threats that come with […]
Cyber attackers regularly exploit unpatched software vulnerabilities, but they continuously target security misconfigurations to gain initial access into victims systems. The US Cybersecurity and Infrastructure Security Agency (CISA), FBI and NSA, as well as cybersecurity authorities from Canada, New Zealand, the Netherlands, and the UK, have created a to-do list for defenders in today’s heightened […]
Enhance Your Business Cyber Security Awareness Cybersecurity is the state or process of protecting and recovering computer systems, networks, devices, and programs from any type of cyber attack. Without the proper cyber defences or cyber security plans in place,you’re an irresistible target for cybercriminals, and your business cannot defend itself against malicious campaigns. Cyber criminals are […]