Android CopyCat on the prowl for Android New strains of malware are being developed every day. In fact, the number was nearly one million per day in…TruewaterJuly 21, 2017
Security Why Nyetya is more threatening than WannaCry The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one…TruewaterJuly 13, 2017
Windows Why is Windows XP getting updates? Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier…TruewaterJune 28, 2017
Android Android mobile security threats today As bring your own device policies becomes common practice for companies today, business owners must keep in mind the possible…TruewaterJune 20, 2017
Security WannaCry: A historic cyberattack No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years,…TruewaterMay 25, 2017
Apple Mac HandBreak downloads infected by Trojan macOS version of HandBrake, an open-source video transcoding software that converts multimedia files into various formats, was recently infected with…TruewaterMay 24, 2017
Apple New malware threats on Mac computers No computer is safe from malware, not even Macs. Even though incidences of viruses and malware are rare for Apple…TruewaterMay 9, 2017
Virtualization What is virtual “sandboxing”? Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within…TruewaterApril 28, 2017
Office Microsoft Word bug: What you need to know Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to…TruewaterApril 26, 2017
Security The phishing craze that’s blindsiding users Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing…TruewaterApril 24, 2017