The IT Pro Blog
A nasty new attack has recently come to light thanks to Motherboard/Vice: attackers silently redirecting your text messages so they can compromise your two-factor accounts
When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed billions of emails
Social distancing, masking, herd immunity…these are words that have become commonplace this year as the world has endured the COVID-19 global pandemic. In December, we
With all this talk of increased cybersecurity measures and vulnerability to phishing attacks, you may be wondering: what are the most vulnerable departments and sectors
Beware: if you’re infected by the QBot Trojan, it’s possible to have your email threads (the chain of back and forth emails in any given
We’ve all heard the term Artificial Intelligence (AI) and in many ways it refers to futuristic possibilities: innovation and an exciting future of artificial intelligence.
We’ve recently learned about a new and intrusive trend where several well-known websites port scan your computer without prompt just by visiting them. The original