5 Ways to Secure your WIFI Network 4 (1)

5 Ways to Secure your WIFI Network

You can access a WiFi network anywhere – from your work to your home to airports and public transit. It’s easy to connect to the Internet nowadays but does that mean WiFi networks are safe? Unfortunately, not. Lists of vulnerable airports and stories of hacker groups using hotel WiFi to spy on business executives show that WiFi networks, especially public …

Logo2000

Threats of the Week – September 17, 2018

  Kronos Malware   On Tuesday, the cybersecurity firm published new research into the malware, saying that the latest Kronos variant, also known as Osiris, was discovered in July this year. Three distinct, separate campaigns are already underway in Germany, Japan, and Poland which utilize the Trojan. The primary infection vector is phishing campaigns and fraudulent emails, as well as …

01 (2)

This Is How Hackers Use Location Tracking Against You

Location tracking has been a big topic in the news after it was recently revealed that Google still tracks its users even with the location settings turned off. However, this topic isn’t new. Most of the apps on your phone are probably tracking your location right now. Mobile apps often ask for permission to use location settings after you’ve installed …

Logo2000

Threats of the Week – September 10, 2018

  CamuBot Malware   A new financial malware bucks the trend and rather than employ heavy stealth techniques to stay hidden, instead, camouflages itself as a legitimate bank security system. The malware appears to be focusing on Brazilian banks at present but business banking customers are most at risk of being targeted. The operators behind the malware begin by performing …

5 Ways To Avoid CEO Fraud

5 Ways To Avoid CEO Fraud

You receive an email from your boss urging you to transfer a large amount of money to pay for an outstanding invoice. It’s not an unusual request; in fact, you’ve handled invoices many times before. So do you send the money immediately? Maybe not. While this may seem like a normal request for some employees, it can also be CEO …

online security and privacy

7 Tips for Online Security and Privacy

As working and socializing moves online, people have become more concerned with online security and privacy. A recent study revealed that 55% of respondents ranked the theft of their personal data as a top concern. Concern over the loss of personal data topped the loss of keys, wallets and even mobile phones. People can easily replace physical items like wallets …

Logo2000

Threats of the Week – September 4, 2018

  RtPOS Malware   Researchers say RtPOS contains only a limited set of functions. For example, the malware’s binary accepts only two arguments —install and remove— and nothing else. The malware is also a classic RAM scrapper only, without any extra bells and whistles. This is in contrast with many recent POS malware strains that try to port and include …

5 Tips to Straighten Up Your Security Posture

5 Tips to Straighten Up Your Security Posture

Data breaches and vulnerability exploits seem to make headlines everyday. These attacks are worrisome, which is no wonder that 54% small-medium businesses cite security as their main concern of this year. The threat landscape is vast, but there are a variety of steps a business can take to be more secure. One of the ways businesses can protect themselves is …

Web

Jolera Awarded SOC 2 Type 1 Certification

Toronto, August 16, 2018 — Jolera Inc., a leading multi-national technology hybrid aggregate service provider (HASP), has achieved SOC 2 Type 1 certification for its controlled, secure and efficient operations. SOC 2 certification confirms that Jolera meets the criteria for the security and availability principles set forth in the Trust Services Principles and Criteria for Security, Availability, Processing Integrity, Confidentiality …

Logo2000

Threats of the Week – August 27, 2018

  FlawedAmmyy RAT   This malspam attack is different as the attackers are using Microsoft Publisher. It is targeting banks rather than enterprises and will install the FlawedAmmyy RAT malware. It is a small campaign being distributed via the Necurs botnet. This attack relies on user apathy around malware attachments. Users get emails with attachments all the time. This means …