With the rise of eCommerce and online banking, cybercrime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cybercriminals do their best to avoid detection by letting malware do the work for them.
As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection.
Ever been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a trojan or worm? And how can you protect your critical data and your business from these threats? If you’ve […]
There are things that all of us hold dear to our hearts: family, a stable career, and our smartphone and tablet. Okay, maybe those last two aren’t as important as the others. But still, your smartphone or tablet is likely an integral part of your life.
Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware – however much disruption and damage they cause to our systems – can be detected and removed thanks to the tracks they leave as they create havoc, […]
As a business owner or manager you likely have many different things on your mind at any given time. One issue that many owners fret over is whether their networks, computers and the data stored within are secure enough.
Myths have always been a part of human culture, and can be found in nearly every aspect of life, including the computer. One of the larger computer-based myths revolves around malware, more specifically the virus. Many users are familiar with the concept but have a tough time distinguishing between what is true and what isn’t. […]
Computer terminology can be one of the hardest things to wrap your head around. It’s can all seem like mumbo jumbo, with made-up or adopted words. Some of the more confusing terminology comes from programs and software with harmful intent. Is the program infecting your computer a Trojan horse, worm or malware though? It can […]
Security experts have recently discovered a new threat to Mac OS X systems. Called the ‘MacDefender’, this malware is designed to fool users into downloading a fake anti-virus program, which informs users that the system is ‘infected’, and then tries to dupe or bully them into buying another fake anti-virus program. It is a widely held belief that one of the reasons Macs are superior to other systems is because of their ‘invulnerability’ to viruses, malware, and similar threats. All well and good, except for the fact that a recent rogue anti-virus malware that specifically attack Mac OS X systems has been discovered. So much for the ‘Mac = no virus’ myth. Called the ‘MacDefender’ and also known as Mac Security and Mac Protector, this malware tricks users by having them think that their system is under attack. It begins when users visit a malicious website where the program automatically downloads itself to the computer. If you have the “Open safe files after downloading” option selected, it automatically installs itself onto the system. The original installation package is then also automatically deleted. Next, a new menu item appears on the Mac OS X menubar. You’ll see a small orange shield that becomes red, which supposedly means that there are viruses in your system. You’ll then be prompted to “register” – which involves giving out your credit card information – to a website to clean the virus. If you don’t, the malware will then direct your browser to porn sites to ‘encourage’ you to register and pay up. To know more about how MacDefender works, check out this video . While Macs are certainly targeted less than Windows systems, the threat of getting infected by viruses and malware is very real, especially if myths like Macs being impervious to viruses persist. To know more about protecting yourself from threats like these, please contact us so we can draw up a plan to keep your system safe and secure.