security

New Office attack method puts users in danger

From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools. What’s the new Office threat? The Office exploit takes advantage of […]

New Office attack method puts users in danger Read More »

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started

Locky-type ransomware is attacking systems Read More »

Mac malware goes undetected for years

When new malware surfaces, many people often assume that it’s designed to attack Windows computers. However, Mac malware has been growing in popularity. Earlier this year, security researchers unearthed a new strain of spyware that may have been silently monitoring Mac computers for years. Fruitfly spyware The spyware, known as Fruitfly, was first discovered in

Mac malware goes undetected for years Read More »

MR to be removed from Google search

If you imagine medical records as being stored in a cabinet somewhere in your local hospital, think again. Until quite recently, medical records were publicly accessible via Google. In an effort to prevent cybercriminals from capitalizing on these resources, Google has removed sensitive medical records from appearing in search results. If an individual’s medical records

MR to be removed from Google search Read More »

Ready to get more value out of your business IT?

Get in touch today to find out exactly how we can help

Scroll to Top