Consumer Threat Notices

Why Software Updates Are So Important

You’re hard at work on your computer or device and a message suddenly pops up saying, “a software update is available”. You’re busy, so you click “cancel” instead of “install”, thinking you’ll get to it later, but you never do. Sound familiar? The truth is it’s easy to skip software updates because they can take …

Consumer Threat Notices

BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices

From headsets, to speakers – Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data wirelessly, Bluetooth technology is widely popular, and has been implemented into billions of devices. Therefore, the discovery of BlueBorne, a vulnerability found in some Bluetooth technology, which cybercriminals can use …

Consumer Threat Notices

How to Spot Phishing Lures

Phishing attacks, in which scammers try to trick you out of your private information or money, are one of the most prevalent threats we see today. Part of the problem is that the cybercriminals have numerous ways in which to hook you, either online, over the phone, or even in person. In today’s busy world …

Consumer Threat Notices

3 Reasons You Need a Personal VPN

It used to be the case that only businesses used virtual private networks (VPNs) to connect securely to the internet and keep their private data safe. But these days, with the rapid growth of online threats and privacy concerns, even the casual internet user should seriously consider using a VPN. If you are not familiar …

Consumer Threat Notices

10 Tips To Stay Safe Online

With hacks, scams, malware and more, the Internet can feel like a dangerous place these days. And, the recent proliferation of devices, from smartphones and tablets to Internet-connected appliances, has opened us up to even greater risks. But the good news is that by taking just a small handful of security measures we can greatly …

Consumer Threat Notices

Petya is Here, And It’s Taking Cues from WannaCry

Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s hit companies everywhere across Europe, including Ukraine’s government facilities, electric grids, banks, and public transportation, demanding a $300 ransom in Bitcoin in the process. So how does this Petya attack work, exactly? Going after Windows servers, PCs, and …