Ransomware as a Service (RaaS) – How Real is the Threat?

There is an erroneous assumption made by many of us that cybercrime is something that occurs in the shadows, that it is anonymous, perhaps only discussed in the far reaches of the deep web. However, there is more and more evidence coming to light of cybercriminals brazenly advertising their wares.

Read more…

Can Ransomware Infect Cloud Storage?

Over the last few years, many businesses and individuals have opted to move their data to cloud storage. Options like Dropbox, Microsoft OneDrive, and SugarSync offer many different benefits compared with storing files locally. These benefits include ease of access, cost-effectiveness, scalability, and security, but is cloud storage really as secure as we like to believe?

Read more…

Best Practices for Working from Home

Working from home has become a new reality for many workers across the globe in many industries. The reality is that if your job can be done via a computer, or simply doesn’t require you to be physically present at your office in order for it to be completed, then working from home is the optimum solution in times like these. 

Read more…

Ransomware Risks for Consumers vs. Businesses, and How to Avoid Them

“Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.” ― James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

Read more…

Sextortion: All You Need to Know

Sextortion – a portmanteau of the words sex and extortion – is a broad term used to describe the practice of exploiting a person (usually in an attempt to get money) by threatening to reveal evidence of their sexual activity, often explicit photos or videos. Sextortion is not a new concept, and we can find evidence of the term being used as early as the 1950s. But the modern definition of sextortion is widely understood to be linked with exploitation through technology – email scams, webcam hacks, stolen photos and videos, etc. It is seen as a growing problem internationally, and it is another weapon that cybercriminals use to target us.

Read more…