Nobody wants to spend the day stressing about dangerous scenarios and “what-ifs,” but in some cases we really must insist. In a recent development, it was discovered that one of the iPad’s anti-theft measures can be easily bypassed with little to no special training.
iPads allow thieves to bypass lock feature
Gooligan malware haunts Android devices
It is the largest single theft of Google accounts ever reported. And if you own an Android 4 or 5 phone, it has likely already affected you. The Gooligan virus, running rampant in third-party app stores, promises to keep wreaking havoc until developers find a way to shut it down.
New year, new cyber-threats
Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood.
Beware of this iPhone-crashing video
iPhone users should be careful about opening suspicious videos circulating in the web. Recently, a bug in the form of a five-second MP4 clip has been passed around in online forums and video sharing websites. The brief video seems harmless at first, but when iPhone users unwittingly click on the video link, their phones begin to slow down and ultimately crash.
Android users’ information at risk?
Android users may have been inadvertently exposed to a major data breach that could have tracked and transmitted a vast amount of information and data from Android devices to hubs and users in China. Some of this data includes call histories and text messages, and various other data that most users would prefer be kept private.
Office 365 upgrades in productivity & safety
The latest Office 365 updates add productivity solutions and increased security to business owners who utilize the cloud-based program. Azure Information Protection, Enterprise Mobility + Security Suite, and Productivity Insight were slated to be released in late 2016. Read on to learn more about Office 365's new features and how you can use them in your business.
Is two-step authentication the only way?
With all the recent hacking scares all over the world, you know and understand that your cyber security and your business’s cyber security are extremely important. However, when it comes to authentication processes, you may not be sure what the real deal is.
Cyber-crime and social engineering
For as long as there have been cybercriminals, there have been social engineers, or people who use tricks and scams to force other people to volunteer sensitive information. There are several ways to use social engineering to acquire valuable information like account passwords and bank accounts, but avoiding these scams comes down to one thing: training.
9 cybersecurity terms everyone must know
Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.
New security patches for VMware machines
While virtualization still has a host of security advantages over its localized counterparts, it isn’t exempt from the attention of cyber attackers. Most recently, one of the industry’s leading software vendors, VMware, was forced to release a patch for a critical vulnerability that allowed underprivileged users to attain access to administrative rights.