Russia’s hackers have new phishing tricks
There’s no rest from Russian hacking groups. This time they’re targeting governments in the U.S., the European Union and former Soviet Union territories with weaponized documents containing malware.
Right now you might be thinking, “Wait a minute, I’m an iPhone user — I don’t need mobile security, right?”
This holiday season, you can count on just about everyone to shop smart, and I mean that in both senses of the phrase. Everybody wants to get the best deals and the most bang for their buck, yes, but I’m also talking about the internet of things, tho…
Our partners in Germany recently cast their vote for best remote monitoring and management solution (RMM) at two local awards events in Schloss-Holte Stukenbrock and Munich. The verdict?
Another Facebook flaw puts user data at risk
The media is abuzz this week with news about Facebook falling victim to yet another vulnerability that could have exposed very sensitive, private user data.
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only is there so much to do but there’s so much to spend money on. There are presents to purchase, feasts to prepare and party outfits to buy. Throw in a holiday to fill the long […]
The post Holiday Stress Can Make You More Careless Online appeared first on McAfee Blogs.
While it makes a great title, not ALL browser extensions are evil. In fact, most can be helpful. The problem is that each and every browser extension, no matter its intended function, has the capability to turn your digital world upside down. Given t…
The Avast Business Mobile Workforce Report 2018 shows small business owners what matters most to their employees and how they can create a mutually beneficial work environment that delivers optimal productivity alongside employee wellbeing.
Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …