Cryptomining is Inspiring Cybercrime

Blockchain technology is mainly known for its use with cryptocurrencies. Even though the values of cryptocurrencies have leveled off after the incredible growth over the past few months, users are still attempting to use cryptocurrencies to make a little extra cash on the side. Of course, if there’s money involved, you can bet there will […]

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device you’d think would be vulnerable to attack from a hacker. What can you do to keep your business’s internet access points secure from hacking […]

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless internet connections every day, and, as a result, hackers are taking that as a challenge. They’re now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through […]

Cybercriminals Who Use This Malware Will Get a Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this? Hackers can […]

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will go to great lengths to gain access to sensitive information. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances to sophisticated attacks on targeted individuals, known as phishing attacks. Do you have ways […]