Hackers Are Intruding on Zoom Meetings

The “New Normal” of working from home has created a surge in the use of the video conferencing service Zoom. Zoom is now being used on a large scale by businesses, schools, and social groups, to keep all connected during the COVID-19 pandemic.   Eric Yuan, CEO of Zoom, stated that in December 2019, the maximum number of daily meeting participants …

Coronavirus Brings Increase in Cyber Attacks

As the Coronavirus continues to instill panic and fear around the world, it is also bringing a massive increase in cyberattacks. The virus has shut down many businesses, and those lucky enough to be working are mostly doing so from home. Cyber criminals are taking advantage of this. That’s because many homes don’t have secure WiFi which gives hackers easy …

Fakes Are Spreading Faster Than the Virus: Beware of Scams Preying Upon Your Fear and Trust

When disaster strikes, consumers scramble for basic necessities, and this virus pandemic is no different. As individuals strive to keep themselves and loved ones healthy, there are individuals positioned to profit off of people’s fears and anxiety. As the pandemic continues, scam websites surface, claiming to provide much-needed, in short supply items.  The cost? Defraud and harm. Inferior products at …

Cybercriminals Using Fear of Coronavirus to Steal Email Credentials

Last week security researchers with IBM X-Force and Kaspersky, leaders in cyber security, discovered that hackers are sending spam emails disguised as legitimate information about the Coronavirus. The emails actually contain malware that could infect desktop PCs and smartphones. This week the scam has come to the United States. Researchers have found phishing emails from cybercriminals purporting to be from the Centers …

Why POS Attacks Happen

A POS, or Point-of-Sale system, is the device in stores where customers pay for goods. A POS has evolved from the simple cash register to a multifaceted terminal that can now record customer orders, process payment cards, connect to other systems in a network, and manage inventory. It is essentially a computer system with software and hardware, and is subject …

2020 Cyber Attacks Are Underway

According to several studies, it takes 197 days to detect a data breach. A Clark School study at the University of Maryland was one of the first to be able to quantify the near-constant rate of hacker attacks of computers with internet access – every 39 seconds on average, affecting one in three Americans every year. Do you want to …

Cybercrime Remains Robust and a Global Threat

According to the 2020 Official Annual Cybercrime Report by Cybersecurity Ventures, cybercrime is the greatest threat to every company in the world. Cyber theft is the fastest growing crime in the U.S. and according to the report, cybercrime damage costs could reach $6 trillion in 2021. Cyber attacks are increasing in size, sophistication, and cost, and nearly half of all …

Malware: The Main Weapon of Cyberattacks

A cyber attack, also known as a computer network attack (CNA), varies in sort and severity.  There is a hacker attack in the United States every 39 seconds, and 43% of cyber attack targets are small businesses. A cyber attack is an assault launched by cybercriminals from one or more computers against another computer, multiple computers or networks.  It’s deliberate …