Security

Don’t let hackers fool you with these tricks

Date: 18 Aug 2016 | Posted BY: ulisticadmin

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves -- social engineering. Unlike malware and other viruses, social engineering tricks people into divulging sensitive data to hackers. Unfortunately, businesses ar

Free decryption tools fight ransomware

Date: 01 Aug 2016 | Posted BY: ulisticadmin

Similar to the shakedowns you see in mob movies where innocent shop owners are forced to pay “protection money,” deploying ransomware is a means of extortion. Computer hackers install it on your network to seize control of your company’s precious confidential data, then demand payment for its safe return. The way in which these nefarious operators commandeer your information and deny you acc

5 security measures made easy

Date: 14 Jul 2016 | Posted BY: ulisticadmin

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone can implement. 1. Two-Factor Authentication Did an attacker

WordPress 4.5.3 patches security vulnerabilities

Date: 05 Jul 2016 | Posted BY: ulisticadmin

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security issues for all previous versions. Check out exactly

Game Over: NBA team losses valuable data

Date: 20 Jun 2016 | Posted BY: ulisticadmin

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and dates of birth of players as part of a spoofed em

Ransomware to begin self-propagation

Date: 09 Jun 2016 | Posted BY: ulisticadmin

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s everything you need to know about this latest development.

Are your site’s images hiding an attack?

Date: 17 May 2016 | Posted BY: ulisticadmin

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to discuss this vulnerability and what you can do to protect

Understand these 4 types of hackers

Date: 28 Apr 2016 | Posted BY: ulisticadmin

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect. So let’s take a closer look at 4 different types of hackers a

4 BYOD security risks you should address

Date: 13 Apr 2016 | Posted BY: ulisticadmin

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD poses a number of security risks if you’re not careful. What are these problems? How

7 Warning signs of malware infection

Date: 29 Mar 2016 | Posted BY: ulisticadmin

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection. So how do you know if your company’s IT security is under threat? Here are a few warning signs to tell if you a