#Unwanted Programs
3 min read
National Online Learning Day: Learning Your Cybersecurity Lesson
September 15, 2020
Observed every September 15, National Online Learning Day was established in 2016 as a way…
4 min read
The time is now for small businesses to prioritize cybersecurity
September 6, 2020
Cybersecurity is no longer a luxury for small businesses. It is a necessity. It is…
4 min read
PE classes are safe, it’s your business that’s under attack.
August 18, 2020
Malicious PE files – no they’re not malware that target the physical education classes at…
5 min read
Anubis, an ancient Egyptian god or malicious malware?
August 9, 2020
If you’re an expert in Egyptian mythology or even have just a passing knowledge of…
4 min read
Diagnosis: improve cybersecurity in your small healthcare business
August 4, 2020
Imagine this: You’re a healthcare professional arriving bright and early at your healthcare place of…
3 min read
Why your employees are valuable to your business security
July 30, 2020
When business owners set out to evaluate their business’ most valuable assets, they often overlook…
8 min read
Troy Stealer Analysis. How it all began?
July 20, 2020
It all began with a link from abuse.ch: https://bazaar.abuse.ch/sample/7c3289cdc59a8cf32feac66069d09c48a930d4665f740968521adaf870172644/ abuse.ch presented a new Trojan in…
3 min read
Beware of malware Zusy! The notorious banking trojan
July 20, 2020
Zusy malware is a banking Trojan that uses man-in-the-middle attacks to steal bank information. It…
6 min read
Agent Tesla malware and how it’s related to you: 7 important facts you should know
July 14, 2020
Dubbed April 2020’s most wanted malware, Agent Tesla malware is an advanced remote access Trojan…
4 min read
Those lazy, hazy, crazy days of a WFH summer
July 13, 2020
First came COVID. Then came social distancing. Then came lockdown. Then came working from home…