Hacked Emails: Get Protected Before and After

You get a flood of messages from friends and family. They’re getting emails from you with seemingly random links, or messages with urgent and/or and cheesy pleas to wire you money. It looks like your email or social media account might have been taken over. What do you do? For starters, make sure your security protections are up-to-date, reset your password, and warn your friends. Read more…

How to Safely Dispose of Your Old Computer

So you have taken advantage of a super recent deal and bought yourself – or received from a loved one – a new computer? Congratulations! Getting rid of the old one? You can ensure its hard drive doesn’t become a treasure chest for identity thieves. Use a program that overwrites or wipes the hard drive many times. Or remove the hard drive, and physically destroy it.
Read more…

The Bad Rabbit Can Hit You So Bad…

A new ransomware attack nicknamed Bad Rabbit has been sweeping through the world since yesterday, October 24, 2017. As a matter of fact, the Ukrainian Security Service had warned on October 14 that a new large scale cyber attack, similar to notPetya, might take place sometime between October 13 and 17. The attack arrived a few days later than expected.

Read more…

Fall Is Here, Don’t Fall Victim to Ransomware

The leaves are changing, the sun is setting sooner, the wind is getting cooler and you’re probably grabbing the sweaters from the other closet. However, ransomware has never been hotter! Fall is officially upon us in the Northern hemisphere. With the days becoming shorter, the darkness descending hours earlier and the temperatures dropping, you might not be too happy that autumn has arrived.

Read more…

What You Need to Know About the ImageGate Ransomware

ImageGate RansomwareRansomware is a form of malware that encrypts a user’s data and prevents them from accessing their personal files until they pay the hacker for their files back. Sometimes users are requested to pay hundreds of dollars in order to receive a decryption key. Usually, ransomware is transmitted through infected email links, malicious websites or popup messages.

Read more…

Thank You!

Thanks for subscribing to our newsletter. You should receive a confirmation email soon.

Subscribe to our newsletter!

Stay updated with the latest security news, tips, and promotions.

zonealarm free av