security bulletin

Boost Mobile Security With Your BYOD Policy and Devices

Mobile devices like laptops, tablets and smartphones make it easy for employees to work on the go. According to a report, 87% of companies rely on their employees to use their personal devices to access business apps. As a result, companies may employ a bring-your-own-device (BYOD) arrangement at work. However, BYOD can be a security threat because employees can access …

Logo2000

Threats of the Week – July 16, 2018

  WellMess Malware   WellMess malware can operate on Windows via Portable Excutables and on Linux via ELF (Executable and Linkable Format). The malware gives a remote attacker the ability to execute arbitrary commands as well as upload and download files, or run PowerShell scripts to automate tasks. The commands are transferred to the infected device via RC6 encrypted HTTP …

Web Browser Risks and How to Avoid Them_1200x800

Web Browser Risks and How to Avoid Them

Web browsers are the gateway to using the Internet and are installed in almost every device. Your web browser has a lot of information about your Internet habits – from the websites you visit to the passwords of all your accounts. While web browsers contain some safety features such as blocking pop-up windows or indicating secure websites, they can also …

Logo2000

Threats of the Week – July 9, 2018

  Clipboard Hijacker Malware   Cryptocurrency Clipboard Hijackers, a recently discovered form of malware, scans 2.3 million cryptocurrency addresses to swap legitimate destinations with addresses the attackers control. Clipboard Hijacker malware scans the Windows clipboard for cryptocurrency addresses and switches legitimate destination addresses for addresses owned by attackers. As a result, the coins in transit end up with cybercriminals instead …

5-Essential-Steps-to-Keep-Your-Company’s-Social-Media-Safe

5 Essential Steps to Keep Your Company's Social Media Safe

A recent report states that about 3 billion people across the world use social media each month. With the ability to reach more people than ever before, it makes sense that businesses are using social media to promote their companies. In fact, 46 percent of Canadian businesses use social media to promote themselves. Source: Smart Insights In a world where …

Logo2000

Threats of the Week – July 3, 2018

  PBot (PythonBot) Adware   PBot has traditionally been used to place adware on its victim’s devices, but one new member of the family instead installed cpuminer that can be used to generate bitcoin and litecoin. Two other new versions of PBot found are still pushing adware. Each is usually distributed through a partner site where scripts are used to …

welcome-paolo-announcement—linkedin

Jolera Welcomes Former CDN Editor As New Channel Leader

Toronto, June 26, 2018 — Jolera, a leading multi-national technology hybrid aggregate service provider (HASP), has appointed Paolo Del Nibletto as its first ever Chief, Channel Business. As a former editor of Computer Dealer News (CDN) magazine, Del Nibletto brings a unique and extensive experience as a channel advocate in the high-tech marketplace and will work to continue building out Jolera’ channel network …

Are-You-Protecting-Your-Business-With-Layered-Security

Are You Protecting Your Business With Layered Security?

A recent report states that hackers have a 7-day window to exploit a vulnerability before people are aware that they’re vulnerable. Hackers exploit these vulnerabilities by connecting through various entry points in your organization. The best way to protect your entry points from hackers is to consider having many security measures or layered security. Source: Canadian Chamber of Commerce What …

Logo2000

Threats of the Week – June 25, 2018

  Mylobot Malware   The new malware, dubbed Mylobot, pulls together a variety of techniques to gain a foothold and remain undiscovered. Among the strategies employed are: Anti-VM techniques Anti-sandbox techniques Anti-debugging techniques Wrapping internal parts with an encrypted resource file Code injection Process hollowing (a technique where an attacker creates a new process in a suspended state and replaces …

Can-Your-Business-Handle-a-Data-Breach

Can Your Business Handle a Data Breach?

Data breaches are costing organizations lots of money. Research shows that the average cost of a data breach is $1.23 million for organizations and $120,000 for small-medium businesses; both numbers have increased from last year. Source: Ponemon Institute There are many factors that contribute to the cost of a data breach. For example, a large data breach leads to a …