Geek is the new Gangster

The facts are out and the jury is in, with cyber-crime affecting millions and costing billions around the globe, Geeks are the new Gangsters. However, unlike Al Capone or Machine Gun Kelly all guns blazing and posing a physical threat, today's cyber criminals use stealth, deception and sophisticated technology to steal valuable business or personal data.

Connecting to Wi-Fi is simple, the security of your data is the real challenge

The traffic on our roads isn’t all we have to worry about these days. Internet traffic is on the rise, with estimates that 63% of it will be traveling through Wi-Fi networks by 2019. With increased pressure by consumers, businesses are having to offer wireless access in public spaces - this can be beneficial at first glance but can pose behind the scenes threats to not only the wireless network provider but also to the users.

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen. The End Game The scam works by displaying an error […]

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails. Understanding DSD Distributed Spam […]

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you. Why auto-fill passwords […]

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]