Spammers hit new Windows 10 users with ransomware

Security experts are warning Windows fans not to fall for a new spam campaign designed to trick users waiting for the new version of the OS to open an attachment crammed with ransomware. Cisco’s Talos team claimed in a blog post that the spam run was a typical attempt to ride the coat tail of more »

read more
On August 4, 2015, posted in: Blog, Security by

Tags: ,

Does teaching hacking lead to more attacks?

A black hat is a hacker who “violates computer security for little reason beyond maliciousness network security, anti-spam or for personal gain”, a definition attributed to Robert Moore in 2005. A white hat has been called an ethical computer hacker and/or a computer security expert who strives to ensure the security of an organization’s information more »

read more
On July 21, 2015, posted in: Blog, Security by

Tags: ,

Our Spam Filtering Service with Office 365 – the perfect match!

Office 365 in the cloud has some great advantages. Microsoft manages the software updates, anti-spam, and email filtering making it easier for the IT support services. You can collaborate in real time using different mobile devices and PCs. According to Adallom’s annual Cloud Usage Risk Report, Box, Office 365, Salesforce, and Google Apps constitute the more »

read more
On July 7, 2015, posted in: Blog, Security by

Tags:

Security Tips & Advice on Safe Internet Browsing Habits

If there is one item that pretty much everyone is familiar with on the Internet, it is the very thing we use to browse it, the Web Browser. Whether you use Firefox, Chrome, Safari, on a Desktop or Mobile device, this article concerns you. How you use a Web Browser has implications about your security more »

read more
On June 23, 2015, posted in: Blog, Security by

Tags: , ,

Facebook cares about your Privacy

The social network is rolling out a security for users to use the encryption standard OpenPGP to protect e-mail notifications sent by the company, and to share their public encryption keys with their friends or with the public. The feature is being rolled out to users starting June 1st 2015. PGP, short for “Pretty Good more »

read more
On June 2, 2015, posted in: Blog, Security by

Tags: , ,

Cyber extortion is on the rise

In 1824, the Duke of Wellington received a letter from a publisher threatening to publish a memoir by his former mistress. The publisher offered to keep the Duke out of the book if he received a sum of money. The Duke reportedly sent the letter back with “Publish and be damned” scrawled on the back. more »

read more
On May 19, 2015, posted in: Blog, Security by

Tags: ,

VoIP: The latest security threat for businesses

More businesses than ever are jumping on the Voice over IP (VoIP) bandwagon today. Aside from significant cost savings when compared to traditional phone services, VoIP also offers many value-added features such as voicemail-to-email transcription, barge and whisper service, call screening, conferencing, music on hold, call routing, portability, and increased flexibility and mobility for employees more »

read more
On April 28, 2015, posted in: Blog, Security by

Tags: ,