Blog

WannaCry: A historic cyberattack

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

Mac HandBreak downloads infected by Trojan

Mac HandBreak downloads infected by Trojan

macOS version of HandBrake, an open-source video transcoding software that converts multimedia files into various formats, was recently infected with a Trojan. According to HandBreak’s announcement, if you downloaded the app between May 2 (14:30 UTC) and May 6 (11:00 UTC), there’s a 50% chance that your system got infected.

How to defend against WannaCry

How to defend against WannaCry

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release.

New phishing protection for Gmail on Android

New phishing protection for Gmail on Android

One of the most common ways hackers infiltrate networks is by using phishing scams — fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method.

Windows Server 2016 and virtualization

Windows Server 2016 and virtualization

Virtualization is a great way to save money and increase the efficiency of your existing IT hardware, but how exactly do you implement a virtualization solution? There are several vendors that provide software solutions, but there’s one almost everyone has already worked with: Microsoft.

Machine learning boosts productivity

Machine learning boosts productivity

Did you know that the applications you use learn something new about you every day? If you’re using any of the G Suite applications, their machine learning algorithms — a set of mechanisms that study usage patterns — derive data based on your work patterns and frequently used files, and then make sensible suggestions accordingly.

More security features for Office 365

More security features for Office 365

Microsoft has commercially released new products and upgrades that will secure company information. The threat intelligence and data governance features are designed for businesses that adhere to strict regulatory guidelines and need an extra layer of protection against cyberattacks.

Predictability coming to Windows 10 updates

Predictability coming to Windows 10 updates

Updates to the Windows operating system have a controversial reputation. On the one hand, Microsoft issues them frequently to combat cybersecurity risks and introduce new features. On the other hand, the update frequency and requirements leave some users feeling like it’s impossible to keep up.