Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks.
Watch out! More ransomware attacks incoming
OneNote: the hidden gem in Microsoft Office
Critical Windows security updates from Microsoft
New Locky ransomware: what you need to know
In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.
Spyware has been infecting Macs for years
While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers.
How Amazon AppStream 2.0 can help businesses
Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.
How fulfilling is Android’s new Oreo
Microsoft’s newest virtualization service
Azure is a cloud platform for creating, deploying and managing virtualized solutions that are hosted by Microsoft servers. Included in Azure’s list of services is a technology that is quickly gaining popularity: containers. They’re a great way to get more out of your servers, but until recently they were also incredibly hard to manage.
How to protect your VoIP system from phishing
Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.
