Portal Home > Knowledgebase > Cybersecurity

Articles

 Backup and recovery means you can say no to ransom demands

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers using CryptoWall ransomware extorted $18 million last year,...

 FBI wants private firms and government organizations to stop using Kaspersky

The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible or avoid from utilizing them in new Machines or other efforts, the new and former officials say....

 FBI: "Extortion And CEO Fraud Are The Top Online Fraud Complaints"

nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and phishing attacks that spoof the boss (CEO Fraud) were among the most damaging and expensive scams...

 Global Study - Application Intelligence Report

ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US  The world’s casual approach to applications, device use and digital behavior is introducing new...

 Got "Russia = BadGuys" Fatigue Yet? They Just Phished a Nuclear Site

A report from the FBI and the US Department of Homeland Security warns of malware attacks targeting mainly nuclear power stations, and energy facilities. The attacks started May this year....

 Is your WordPress website secure?

Whenever we talk about WordPress and security, it’s important to address one question right off the bat. How secure is WordPress? The answer is, WordPress is one of the most secure web publishing...

 Keeping WordPress up to date

As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if you have a live WordPress site on the web, and a new maintenance and security update comes out,...

 Learn how Mobile AST is different from traditional AST and is pervading the enterprise in this research from Gartner

This “must-read” guide for application security and risk management professionals provides recommendations for instituting or improving mobile app security testing at the enterprise. Download the...

 Limit WordPress Admin access

You already know that when you set up your WordPress site, the account that you set up for the WordPress site is an Administrator account, and anytime you log in with an Administrator account, you...

 Malvertising: Technological or Psychological Warfare?

Cyber criminals are using modern-day online advertising techniques to target end users, mess with their minds, and infect their computers with malware. Seemingly-harmless adverts now host today's...

 New Fileless, Code-Injecting Ransomware Bypasses Antivirus

Security researchers have discovered a new fileless ransomware in the wild, which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destructs...

 New Massive Wave of CryptoLocker Ransomware Infections

We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of millions of ill-gotten gains after he became the FBI's #1 Most Wanted cybercriminal. Well, perhaps he...

 Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to...

 Ransomware Now Hits Linux - Web Hosting Provider Pays a Million

South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware attack hit 153 Linux servers. The attack took place June 10 and resulted in over 3,400 business...

 Scam of the Week: Phishing Moves to Smishing

Internet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with smishing attacks, which are hard to stop.The...

 Scam of the Week: Real Estate Wire Transfer Phishing Fraud

According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of selling her apartment and buying another, when she received an email that seemed like it was coming...

 The Recorded Future Blog: Going Dark: Fact vs. Fiction on the Dark Web

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from...

 Windows 10 Stops Ransomware Cold? Not So Fast!

Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators Update. Presenting new anti-ransomware protection features added in Win 10 CU, Robert Lefferts, Director...

 WordPress backups and logins

Backing up WordPress An important part of data security, whether it be your own data on a computer, on an external drive, on a disk, or in this case, a website running WordPress on the web, is to...

 Your website SEO attack

Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for in-demand keywords, you can expect to be the target of a number of negative SEO campaigns trying to tear...

Powered by WHMCompleteSolution