A closer look at fileless malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic, IT processes, and system administration tasks while leaving fewer footprints.

Keep your mobile devices safe with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses.

New Android malware detected!

If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures.

Another Windows 10 update, another raft of issues

It’s the update season for Windows 10 users. Although it’s normal for us to experience an uptick in support requests during these periods, things are looking worse than normal this time around. That’s because Microsoft’s most recent operating system update has caused data loss for some users.

Security best practices for remote workers

Working from home increases employee autonomy, cuts costs, and ensures the health and safety of the company during the coronavirus pandemic. The problem is, it also increases the likelihood of security breaches since employees are working outside the company's security perimeter.