Cloud Consultancy News
Chrome update stops websites from tracking you in Incognito Mode
Google has launched Chrome 74 for Windows, Mac, Linux, Android and iOS, bringing with it a bunch of handy new features, although some - such as Incognito detection blocking - require a bit of tinkering to access. Straight out of the box, though, is motion reduction...
Emotet Malware – What is it?
Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)...
9 Cyber Security Issues That Could Be Leaving Your Data Vulnerable To Attacks
As our reliance on technology grows, so does our need for improved cybersecurity. With so much of our personal information stored in our devices, simply browsing online or enabling certain settings on your smartphone may be leaving you vulnerable to hackers. Of...
New Phishing scam called ‘The Hotlist’ now targets the Instagram users
- The new scam operates in a similar manner as the recent ‘The Nasty List’ scam. - The scam begins with Instagram users receiving a message regarding a list of their ‘hot’ photos on Instagram. A new phishing scam called ‘The Hotlist’ has been found targeting Instagram...
Employee cybersecurity essentials part 2: Lost devices and unsafe connections
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private lives is tricky. It can reinforce ITs added challenge of protecting company assets by having...
Employee cybersecurity essentials part 1: Passwords and phishing
Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an employee, that you’re not putting your company at risk. Humans have always been the weakest...
Cyber espionage and sabotage attacks pose an increasing threat to the energy industry
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and cyber attacks often go undetected for some time. As energy companies save...
One hundred percent of endpoint security tools eventually fail
Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in...
French government releases in-house IM app to replace WhatsApp and Telegram use
The French government has developed its own end-to-end encrypted instant messenger (IM) app to replace government employee use of Telegram, WhatsApp, and other third-party IM clients. The app, named Tchap, was launched on April 18, and is available on the official iOS...
Google Chrome to get a Reader Mode
Google's Chrome browser will get a Reader Mode, similar to the one found in competing browsers like Firefox and the old Microsoft Edge. The feature is currently under development, but Chrome Canary users can test it starting today. Chrome's Reader Mode will work by...