Coinbase’s Super Bowl QR Snafu is Sending Shockwaves Through IT Security Circles

During the first half of the Super Bowl last month, cryptocurrency exchange company Coinbase bought a minute of ad space to broadcast an ad that was just a QR code on the screen, meandering diagonally around the screen like the famous Windows screensaver. Millions of people took out their smartphones and scanned the code and […]

How to Properly Evaluate Your Security

How effective is your cybersecurity? It seems like a simple question, but no less important to consider and determine as the answer could be the difference between a prevented breach and a successful one. In order to keep track of your business’ cybersecurity preparedness, it is important that you regularly evaluate it. Let’s go through […]

There is No Value in Paying a Ransom

We all know at this point how dangerous ransomware can be for businesses. It can lock down files, threaten operational continuity, and in some cases subject victims to brutal fines because of privacy breaches. One place where you might not expect ransomware to hit, however, is customer reviews, and it all stems from the big […]

Malware is Everywhere. Even Your Ads

Do you ever see an advertisement for a free download of a popular Windows application and think it sounds too good to be true? Well, it most likely is, and hackers use these malvertisements to infect computers with malware and other threats. Specifically, malvertising is used to download three different types of malware, all of […]

Is it Time to Move Past Passwords?

Passwords have been a staple in data security and user authentication for many years, to the point where the idea of using a password has become nearly synonymous with the concept of security. Data has increasingly shown, however, that alternative options are in fact more secure. Let’s examine some of these passwordless authentication methods and […]

Some Places Encryption Should Be Used Frequently

Protecting your organization’s data is a major focus of businesses these days, especially as threats grow more powerful and they better learn to penetrate the countless safeguards put into place. Let’s go over how encryption can help you cover all your bases, especially if hackers do manage to get through your security precautions.

Let’s Look at Some of the Virtual Threats

Network security is challenging for many businesses, and it’s largely because of the large number of various threats that populate the internet. Some companies simply don’t know what the correct measures to take are, leaving themselves vulnerable to these threats on both a security standpoint and an employee training standpoint. We’ll delve into some of […]

Why is Microsoft Warning Users About Password Spraying?

As modern warfare has evolved, so too has cyberwarfare. There is always a war occurring in cyberspace, where hackers attempt to outdo security researchers. One such example of hackers—often sponsored by government agencies—attempting to engage in cyberwarfare can be seen in the United States and Israeli technology sectors, which have become the target of password […]