4 Key Steps to Prevent Ransomware
Falling victim to ransomware is disheartening and financially costly. Find out how to avoid it now…
4 Key Steps to Prevent Ransomware Read More »
Falling victim to ransomware is disheartening and financially costly. Find out how to avoid it now…
4 Key Steps to Prevent Ransomware Read More »
It is believed 2016 will be the year ransomware holds America hostage…
Could Ransomware Hold America Hostage? Read More »
Fake tech support companies have been using popups and programs for quite some time with several different justifications to “fix” your computer. Here is a breakdown of a typical tech support scams. The Hook In order to have the victim call, there must be a method to force the user to call without looking
The Anatomy of Tech Support Scams Read More »
Worms, Trojans , and Rootkits are not the same.
The Differences Between a Virus, Trojan, and Rootkit Read More »
A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely
The Tewksbury Police Department in Massachusetts was infected by ransomware and chose to pay $500 in Bitcoins to the cyber criminals…
Tewksbury Police Dept Paid Ransom in Ransomware Attack Read More »
A police department in Lincoln County, Maine whose shared server was infected by ransomware chose to pay $300 to the cyber criminals…
Police Force Now Victim to Ransomware Read More »
Representatives of the North East Texas Independent School District have confirmed that 20 schools in the district have been infected with ransomware…
20 Texas Schools Hit with Ransomware Read More »
Tech Sentry is about to make their debut at the Synnex Spring Varnex Conference…
Tech Sentry to Appear at Varnex Read More »
You’re hit with ransomware – do you pay the ransom or not?
Paying Ransomware – Should you or shouldn’t you? Read More »