Tag Archives: Malware

CopyCat on the prowl for Android

New strains of malware are being developed every day. In fact, the number was nearly one million per day in 2015. With so many in existence, some have gone under the radar, as such is the case with CopyCat. So if you’re using any type of Android device, know that CopyCat likes to use its […]

Posted in Android, General Articles A | Also tagged , , , , , | Comments closed

Android devices easy prey for CopyCat

There’s a reason malware makes the headlines on the internet almost every day: its impact on business has proved devastating. Nearly one million new strains of malware are being developed each day, which goes to show how popular of a weapon it is in a hacker’s arsenal. Unfortunately, even older malware can still wreak havoc […]

Posted in Android, General Articles C | Also tagged , , , , , | Comments closed

Steer your Android clear of CopyCat

The number of new malware being developed each day is alarming. If you think hundreds or thousands are a lot, try nearly one million. One that is extremely cunning goes by the name of CopyCat, which emerged in 2015 and has already infected millions of Android devices. That said, here’s everything you need to know […]

Posted in Android, General Articles B | Also tagged , , , , , | Comments closed

Beware: Nyetya is worse than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history. Like WannaCry, its attackers exploited unpatched Microsoft vulnerabilities and demanded a $300 ransom in Bitcoins. […]

Posted in General Articles C, Security | Also tagged , , , , , | Comments closed

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small […]

Posted in General Articles B, Security | Also tagged , , , , , | Comments closed

Why Nyetya is more threatening than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

Posted in General Articles A, Security | Also tagged , , , , , | Comments closed

Windows XP receives security update

Support for Windows XP ended in April 8, 2014. This means that Microsoft has stopped providing updates, security patches, and technical assistance for XP users for over three years. But despite the end of support date, Microsoft has recently released a new security fix for the outdated operating system. Here’s why. More WannaCry copycats The […]

Posted in General Articles C, Windows | Also tagged , , , , , , , , , | Comments closed

Microsoft issues security patch for XP

When a Microsoft product reaches its “end-of-life,” the tech developer no longer provides feature updates, technical assistance, and automatic fixes for that product. Support for Windows XP, for instance, ended in April 2014. That said, recent malware attacks have caused Microsoft to continue support for their outdated operating system. Read on to find out more. […]

Posted in General Articles B, Windows | Also tagged , , , , , , , , , | Comments closed

Why is Windows XP getting updates?

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons. […]

Posted in General Articles A, Windows | Also tagged , , , , , , , , , | Comments closed

Android mobile security threats today

As bring your own device policies becomes common practice for companies today, business owners must keep in mind the possible cyber security implications of deploying more devices connected to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as […]

Posted in Android, General Articles A | Also tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.