New Mac Malware Is a Reminder That All Computer Users Must Take Security Seriously

A piece of malware targeting Mac computers named Backdoor.MAC.Eleanor is making the rounds. While it may still come as news to some users that Macs can get infected, Mac OS X — Ap …

Read More »

An Inside Look at a Ransom Note

Satana Demands Payout and Warns Against Recovery Attempts With ransomware attacks making headlines nearly every day in 2016, it seems that IT security professionals and the cybercrimina …

Read More »

The Looming Threat of New Malware for Macs

The ecosystem of Apple’s Mac OS has long been heralded as a safe haven from the world of digital threats, and while its users were never immune to common phishing scams, they were …

Read More »

5 Tips for Making Your Business a “Best Place to Work” With Cost-Effective IT Upgrades

There’s no question that employees in today’s workforce are more technically literate than the generations before them. They use technology regularly to do their banking, ge …

Read More »

Can Antivirus Software Be Trusted?

The Project Zero team at Google looks for defects in various software products. A researcher named Tavis Ormandy takes part in this effort. He recently identified serious security weakn …

Read More »

Is the Government Spying on You?

Judge Rules No Warrant Needed for FBI to Hack Private Computers   In taking the epidemic of hacking to a whole new level, a judge for the federal court for the Eastern District of …

Read More »

A Dangerous Loophole: Lenovo’s Security Mishap

Why Lenovo is telling users to remove an application because of a dangerous loophole. Lenovo has been urging its users to remove one of its applications after the discovery of a serious …

Read More »

Paying Off Ransomware Is a False Savings

It started with personal computers and then morphed to attack business data. The “it” is ransomware, and it is the latest way that black hat hackers have caused concern for …

Read More »

Does Facebook Spy on Me?

There’s little doubt that Facebook collects plenty of information about most Internet users. It employs activity logs, cookies and “Like” buttons to monitor both membe …

Read More »

Phishing Attacks Now Have Ransomware Payloads

Do you back up everything each hour when your system is busy, and at least once a day, if it is not? Do you disconnect your backup devices from your system when they are not actually ba …

Read More »