Tag Archives: threat

Five tips to prevent VoIP eavesdropping

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever […]

Posted in General Articles A, VoIP | Also tagged , , , , , , , | Comments closed

Five ways to avoid VoIP eavesdropping

With the recent headlines on cyber attacks via Voice-over-Internet-Protocol (VoIP) eavesdropping, the safety of your communication systems is clearly at risk. As cyber criminals constantly find new ways to infiltrate your business, now might be the right time to implement the proper defenses for your VoIP phone systems. Get the ball rolling with these following […]

Posted in General Articles C, VoIP | Also tagged , , , , , , , | Comments closed

Avoid VoIP eavesdropping with these tricks

As of late, eavesdropping has been making the headlines due to the surge in frequency. Making it an ideal time to review how well your Voice-over-Internet-Protocol (VoIP) phone systems are protected. However, this isn’t entirely new to VoIP, Vomit and Peskyspy are just some of the prolific VoIP eavesdropping attacks that have gained infamy since […]

Posted in General Articles B, VoIP | Also tagged , , , , , , , | Comments closed

Fantom: the latest cybersecurity spectre

It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

Posted in General Articles A, Windows | Also tagged , , , , , , , , , , , , | Comments closed

How Fantom is haunting unsuspecting users

The heart of a lady is not easily won; a man can’t rely on his looks or wallet to make a girl fall head over heels. He must charm his way into her heart. Let’s say that a computer user is the woman, and that ransomware, the man, is the dreamboat that has worked his […]

Posted in General Articles C, Windows | Also tagged , , , , , , , , , , , , | Comments closed

Ransomware appears as fake Windows Update

Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable. […]

Posted in General Articles B, Windows | Also tagged , , , , , , , , , , , , | Comments closed

Ransomware ravages Microsoft Office 365

Picture yourself receiving a phone call from kidnappers saying that they have snatched your only child while demanding a ridiculous amount of money for their safety. Now imagine a similar scenario, but this attack is geared towards Microsoft Office 365 users, complete with a ransom note and an audio message informing victims that their files […]

Posted in General Articles A, Office | Also tagged , , , , , , , , , , , | Comments closed

Microsoft Office 365 ravaged by ransomware

The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad – some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware […]

Posted in General Articles C, Office | Also tagged , , , , , , , , , , , | Comments closed

Microsoft Office 365 ravaged by ransomware

Many users feel safe behind their monitors and why shouldn’t they? With the myriad of IT security measures available out there, it’s easy to make any device feel like Fort Knox. What many people underestimate though, is the tenacity and relentless determination which cyber criminals have when searching for the tiniest loophole they can find […]

Posted in General Articles B, Office | Also tagged , , , , , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.