June 9, 2017 - Many people post unredacted medical images to Twitter and Instagram. They shouldn't because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.
June 7, 2017 - We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let's take a look at some of the other players working to keep you safe.
May 24, 2017 - Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.
May 4, 2017 - OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let's take a look and see how long they’ve been around prior to publication.
April 25, 2017 - A lot of companies don't make it all too clear who their tech support is. Given the wide variety in how legitimate companies handle their support, how can you tell the difference between tech support and a tech support scam? We point out how to differentiate us from a tech support scammer.