Best Practices for Working from Home

Working from home has become a new reality for many workers across the globe in many industries. The reality is that if your job can be done via a computer, or simply doesn’t require you to be physically present at your office in order for it to be completed, then working from home is the optimum solution in times like these. 

Read more…

Ransomware Risks for Consumers vs. Businesses, and How to Avoid Them

“Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.” ― James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

Read more…

Sextortion: All You Need to Know

Sextortion – a portmanteau of the words sex and extortion – is a broad term used to describe the practice of exploiting a person (usually in an attempt to get money) by threatening to reveal evidence of their sexual activity, often explicit photos or videos. Sextortion is not a new concept, and we can find evidence of the term being used as early as the 1950s. But the modern definition of sextortion is widely understood to be linked with exploitation through technology – email scams, webcam hacks, stolen photos and videos, etc. It is seen as a growing problem internationally, and it is another weapon that cybercriminals use to target us.

Read more…

5 Major Cybersecurity Trends for 2020

2019 is gone and a new decade is in sight. 2020 is said to be a year that will bring on many changes in many different realms, but what does that mean for cybersecurity? With the rapid advancements in technology come better, more sophisticated tactics for cybercrime, and in return, pressing demand for innovative cybersecurity solutions.

Cybercriminals have become more sophisticated than ever, finding and exploiting vulnerabilities wherever they can. These crimes cost the global economy around $45 billion in damages in 2018 alone, and likely much more in 2019. Hence, it is no surprise that spending on cybersecurity solutions will likely exceed $1 trillion between 2017 and 2021. So what kind of cyber threats can we predict for 2020, and how can we protect ourselves from them?

Read more…

File-less malware attacks – Can we fight them?

File-less malware attacks are on the rise. As a result, much has been written on this sophisticated form of attack, which is able to evade traditional anti-virus solutions due them not needing to install any malware to infect the victim’s machine. Instead, they take advantage of existing vulnerabilities in every computer and uses common system tools, such as Windows Management Instrumentation (WMI) or PowerShell to inject malicious code into normally safe and trusted processes.

Read more…

Thank You!

Thanks for subscribing to our newsletter. You should receive a confirmation email soon.

Subscribe to our newsletter!

Stay updated with the latest security news, tips, and promotions.

zonealarm free av