The Latest Cybersecurity Threat: Banking Trojans

The Latest Cybersecurity Threat: Banking Trojans

By | Cybersecurity, Email Security, Hacking, Network Infrastructure & Security, Viruses, Trojans, Ransomware and other Malware

Trojans are a broad category of malware that was first described as a theoretical computer vulnerability by the US Air Force in 1974. Since then, they’ve become some of the most insidious and dangerous types of malware in existence. One type, known as the banking trojan, specializes in stealing financial…

Read More
Don’t Fall Victim to the Latest Ransomware Scam this Tax Season

Don’t Fall Victim to the Latest Ransomware Scam This Tax Season

By | Cybersecurity, Phishing, Viruses, Trojans, Ransomware and other Malware

It’s another tax season, and while most companies scramble to file their Internal Revenue Service (IRS) returns, scammers will be looking to capitalize on the chaos. Con artists use this time to elicit sensitive information from individuals and businesses, using the IRS as their preferred moniker. Falling victim to a…

Read More
Cybersecurity News: Russian Hackers Charged With $100 Million in Cyber Theft

Cybersecurity News: Russian Hackers Charged With Cyber Theft Worth $100 Million

By | Cybersecurity, Email Security, Hacking, News & Updates, Phishing, Training

Anyone who has been paying attention to the latest cybersecurity news might have noticed a big story breaking in early December. Two Russian hackers were indicted in what is considered to be the largest cybercrime spree in history. Maksim Yakubets and Igor Turashev are the leaders of Evil Corp, a…

Read More
What Is Your Cyber Attack Prevention Plan?

What Is Your Cyber Attack Prevention Plan?

By | Cybersecurity, Email Security, Hacking, Managed Services, Network Infrastructure & Security

Cyberattacks are forefront in the minds of every business owner, regardless of the type of business or the size or the company. No one is out-of-reach for these unscrupulous criminals. Despite the considerable efforts of IT technicians and sophisticated software designed to detect and prevent unauthorized access to your networks…

Read More