Feeling spooked? It may be because a ‘dead’ mobile app has come back to haunt you… Termed “dead” or “stale,” these waning apps introduce a multitude of security vulnerabilities to a workplace environment, and thus have been coined one of the biggest mobile security risks facing enterprises today. For some background, a ‘dead’ app is […]

Over 300 million users post an average of 70 million photos and hit the like button 2.5 billion times a day on Instagram. That’s a lot of ‘grammin’ goin’ on. It’s easy as the mom of a teenager to give this beautiful social hub a smiling, compliant nod. After all, the photo-based social network is […]

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free.       […]

Cybercriminals gain access to our online data often, and for a variety of reasons. Most of the time, they like to do so unnoticed. But a new cybercrime trend is changing the game, bringing forth a more confrontational side of cybercriminals. It’s called ransomware, and it’s growing in popularity. Its mission is simple: lock down […]