tumblr site counter

5 Tips to combat VoIP eavesdropping

Eavesdropping is a form of cyberattack that has been around for years. Cybercriminals have been listening in on Voice over Internet Protocol (VoIP) phone calls since the technique was proven to be effective in obtaining valuable information, and they are showing no signs of stopping their malicious activities anytime soon. Fortunately, there are some things […]

Protect your Mac from these threats

Through the years, Apple products have shown resistance to different kinds of malware that Microsoft computers weren’t able to dodge. This, however, does not mean that Macs are invulnerable. Here are some threats you should watch out for to keep your Mac protected. What are the threats that can affect your Mac? There are several […]

Protect your Mac from malware

It is common knowledge that Windows computers tend to deal with an assortment of viruses and malware, but many people fail to realize that even Macs face similar threats. Virus creators have become adept at finding back doors and other vulnerabilities, that even Macs can be targeted. Viruses that affect Macs There are four general […]

How SMBs can prevent VoIP eavesdropping

In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping. Ensure that you never become one by implementing […]

Google ridding MR from search results

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual’s medical records were leaked, that could be both […]

Five ways to avoid VoIP eavesdropping

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever […]

New year, new cyber-threats

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, […]

Chimera ransomware’s scary tactics

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims […]

Twitter alerts users to cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]