TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware. This means the time for security professionals to boost cyber situational

When it comes to websites, speed matters. Internet surfers everywhere are becoming more and more impatient. When once five, or even ten seconds, was a completely acceptable time to wait for a page to load, those days are long gone. Now most users expect a page to load in at least three seconds, some even

A paintbrush can create the Mona Lisa or the Last Supper. An airplane can bring passengers to exotic locations anywhere on the planet. And stone, deftly placed can produce wonders such as the Pyramids or Angkor Wat. But what do the paintbrush, airplane and stone all have in common? Without the wisdom of the painter,

Imagine if all of your company cloud apps, financial data and security video footage – representing 10 years work – was instantly inaccessible to every single computer user in your business. It’s the stuff of nightmares, but it was all too real for a successful Australian tourism company last month. On New Year’s Day, while

People easily get riled up over online security. With a quick Google search, you can find dozens of articles warning about Trojans, viruses and other security threats. But how many of them do you actually need to worry about? Really, it all comes down to threats that cause massive damage and affect your unique technology.

Installing a VoIP system in your business may be an afterthought. The name itself sounds confusing enough, so you’d rather not bother with it – especially when you already have a traditional phone line. So what if there was an easy way to give VoIP a try that could save you some money in the

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here are some tips to protect

The term ‘image’ is no longer associated with just pictures or paintings. In this modern day and age, image extends to how one perceives your business in reality and online. You can’t simply hit F5 and refresh an image you aren’t comfortable with. Find out how you can constantly maintain and improve your online image

BleepingComputer is a well-known go-to site that offers the so often needed basic introduction to anything computer related, tutorials and software reviews. We sat together with Lawrence, the founder and godfather of BleepingComputer, to take a look behind the scenes and his motivation to spend endless hours in helping malware victims. What made you found BleepingComputer

Want to get rid of annoying screen lockers, error messages and pop-ups in the background, without installing any software? Emsisoft Emergency Kit accomplishes exactly that! It is completely portable and free of charge for private use. Users all around the world love it for obtaining a second opinion about any potential infections of your computer. This