Man at a cafe having a headache

You've Been Scammed—Now What?

You’re always careful, but now you’ve been caught! You clicked on an infected link. What do you do?
Fake call center worker

Call Center Exploits – What You Need To Know

Cybercriminals are getting bold and using the telephone to convince users to download malware. Find out about this new tactic and what to do about it.

A Lesson To Be Learned

If your company has not been hacked or victimized yet―consider yourself lucky and use the time to prepare for an attack when it comes.

Look Before You Click!

Look carefully at the URLs before you click to make sure they're legitimate. The bad guys are using look-alike letters to trick you..

Hackers Serve Malware Cocktail That Evades Most AV Programs

Malware cocktails are hard for AV programs to detect because of their ever-changing code. They are dropped onto systems via phishing emails.

Watch What You Type Into Your Browser!

Cyber-criminals are smart and look for common misspellings of legitimate websites to create their look-a-likes to ensnare you.

2018 … And The Beat Goes On

Vulnerabilities were found in Intel, ARM and AMD processors that power most devices today. Hackers are poking holes in major systems.
city buildings

Security Alert: Supply Chain Attack Nabs CCleaner

CCleaner was compromised using the company's own v5.33 installer. It is estimated that over 2 million users ran the compromised version.
Scammers contacting Finance Executives

Security Alert: New IRS/FBI Ransomware Scam

Using IRS and FBI images in emails, hackers are tricking unsuspecting users into clicking malicious links.

To A Hacker—You’re Not Important But Your Data Is!

Your information is everywhere on the internet and many online databases are not secured properly. It's free data for hackers!