For millions of people their phone is their most important device. In fact, many people do their computing exclusively on their smartphones. Today, the best devices give people the option to do anything they need to do from the palm of their hand. Let’s take a look at some of the best smartphones available to consumers today. Read More
- Published: 21 Oct 2020
Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.
- Published: 15 Jun 2020
We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.
- Published: 29 May 2020
With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.
- Published: 18 Dec 2019
LifeLabs, one of the largest private providers of health diagnostic testing, said in an open letter to its customers that the firm had become aware of a recent hack to its computer systems that contained customer information, names and logins. It didn’t specify exactly who had hacked the system but LifeLabs alerted the Ontario and B.C. privacy
- Published: 11 Nov 2019
The term “hacker” has firmly become a part of the public lexicon, thanks largely in part to pop culture and its liberal use of the term. However, the use of the term so frequently has effectively diluted its meaning to “someone good with computers.” In order to keep your business secure against the hackers of
- Published: 09 Oct 2019
Fishing – a jerk on one end of a line waiting for a jerk on the other end.Phishing – very similar to fishing, but much more consequential. While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far
- Published: 26 Aug 2019
With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018, over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Back in early May we took a look at
- Published: 14 Jun 2019
Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium
- Published: 22 Feb 2019
Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what