Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable. […]
Keeping your company data safe and secured is not an easy job, especially as cyberattack threats get more and more sophisticated every day. But fret not, there are a lot of simple solutions that can be achieved with almost any level of tech expertise. In this article, we’ve listed 5 of our favorite cybersecurity tips […]
As 2015 came to a close, there are several trends in the healthcare industry that medical researchers and practitioners need to be aware of in 2016. According to PwC Health Research Institute, patients will be on the lookout for better ways to manage their health and medical expenses. Technology is also expected to play a […]
While a small number of Facebook and Google users have, in the past, been warned that their accounts may have been hacked into by something called a “state-sponsored actor”, users of social media platform Twitter have largely escaped unscathed by the phenomenon. Or at least they haven’t been told about it. Until now, that is, […]
THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer
The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys." Well, yes and no. While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.