X

Category: Security

Don’t get hooked: Anatomy of a phishing attack

Becoming the victim of a phishing attack is easier than you think. Scammers are lurking…

New year, new threats: Cybersecurity trends you must pay attention to in 2018

Security is one of the fastest changing and quickly advancing areas in technology. Organizations that…

How the IT community is affected by Meltdown and Spectre

Meltdown and Spectre are causing massive panic among the general population and creating a large…

Killer sex: Robot hack could pose fatal dangers to users

As absurd as the idea of a murdering sex robot may sound, this is one…

Linux security concerns rise as hackers target the OS

Linux security is becoming a concern as hackers exploit vulnerabilities in the OS. But solutions…

Boomers, Gen X, and millennials: Don’t let the workplace generation gap cause an IT security gap

Boomers, Gen X, and millennials working side by side creates a diverse and dynamic workforce.…

Usability or security? The pendulum keeps swinging for end-user computing

In end-user computing, there are “pendulums” around particular schools of thought. When it comes to…

The biggest tech attack surface in your company and how to reduce it

What you think may be your biggest attack surface may not actually be what it…

Facepalm! Most still practice bad cybersecurity methods

The more things change, the more they stay the same. A new survey shows that…

Microsoft as the largest security company in the world and its entry into Ransomware prevention

You may not have known this, but Microsoft is the largest security company in the…