Have you heard of malware? That’s scary enough – but have you also heard of ransomware? This is where criminals lock you out of your data. And you have pay to get access to it again. Our new video has three ways you can protect your business from ransomware.
Fraudsters are continuing to exploit self-employed people with advancements in already-established COVID-related HMRC phishing scams. Uncovered by Griffin Law, the latest variation of this attack is now targeting the passport details of self-employed people, along with other information including personal and bank details. According to Griffin Law, the scam begins with a text message purporting to be from
ESET is the latest security company to notice a sharp spike in RDP-based hacks over the last few months. The anti-malware company spotted a rise in the number of brute-force attacks using the remote access protocol, and said that cyber-criminals have been using it to distribute ransomware. The Remote Desktop Protocol is a proprietary Microsoft protocol that allows
More than a third of businesses do not have a ransomware emergency plan in place, or are not aware if one exists within their company. According to research from Ontrack of 484 organizations, 39% either did not have or were not unaware of a ransomware strategy, while 26% admitted they couldn’t access any working backups after an attack.
Researchers have once again spotted crooks using calendar invitations to mount phishing attacks. The Cofense Phishing Defense Center found the attack in enterprise email environments protected by Proofpoint and Microsoft, it announced last week. The phishing scam uses iCalendar, which is a media type that lets users store and exchange calendaring and scheduling information, including events and tasks. iCalendar
Over one million North American students have had their data exposed after a popular online learning platform left it in a publicly accessible cloud database, according to vpnMentor. Researchers from the firm claimed that the Elasticsearch database belonging to provider OneClass was left completely unsecured. The trove contained over 27GB of data, amounting to 8.9