Can Ransomware Infect Cloud Storage?

Over the last few years, many businesses and individuals have opted to move their data to cloud storage. Options like Dropbox, Microsoft OneDrive, and SugarSync offer many different benefits compared with storing files locally. These benefits include ease of access, cost-effectiveness, scalability, and security, but is cloud storage really as secure as we like to believe?

Read more…

Log4j Zero-Day Flaw: Update on the High-Profile Security Vulnerability

A vulnerability (CVE-2021-44228, also known as Log4Shell or LogJam) in the Java-based logging utility Log4j has caused widespread panic on the internet as security experts rushed to patch the flaw.

Read more…

What is a Personal Firewall?

Firewalls are a term many know as protective of their computers from cyberattacks, but not many know what they do and why they need it (if at all). In this article, we will explore the Firewall, its use, importance, the differences between a personal Firewall and one used for enterprises and large organizations, and what our recommendation for a great Firewall.

Read more…

Are Wi-Fi Hotspots Dangerous to Use?

Hotspots, for those who don’t know, are points of internet connection, allowing you to access them. One you may be familiar with is the one found on your mobile device and the ones available at cafes, restaurants, hotels, airports, and other public places. Your phone, in this case, acts as a router.

Read more…