Your Jailbroken iPhone Is a Threat to Your Company, Says Microsoft

For those that want to truly personalize their phone, jailbreaking has always been an excellent way to make your device truly yours. However, Microsoft has released an update to Windows Defender for Endpoint that will sound the sirens if it detects a jailbroken iOS phone on a company network. Microsoft’s Newfound Hatred Of Jailbroken iOS Devices […]

Continue Reading

What Is an Advanced Persistent Threat and How Can an APT Be Detected?

Many companies do their very best to collect as much data as possible about customers. Some even give their products away free of charge in return for the permission to collect personal information. As a result, even smaller businesses now have a wealth of valuable data. And more and more threat actors are looking for ways to steal […]

Continue Reading

Forget Ransomware, Microsoft Says Cryptojacking Is Our Biggest Threat

For a while, ransomware attacks were a hacker’s and scammer’s favorite tool for extracting money from their victims. Now, Microsoft reports that ransomware has now fallen out of favor in place of another kind of attack: cryptojacking. Why Cryptojacking Took the Number One Spot On the Microsoft Security blog, the company details how the scope of […]

Continue Reading

What Is Joker Malware? How to Protect Yourself From This Threat

Joker malware is yet another threat to your privacy and sensitive information. It recently attacked mobile Android devices across the globe, which lead to the removal of several apps from the Google Play Store. That said, Joker malware is anything but a joke. If you want to keep your device secure, you’ll need to know […]

Continue Reading

Is TikTok Really a National Security Threat?

TikTok is a popular app for watching and sharing short videos, usually set to music. It has followed in the footsteps of Vine as somewhere to post and watch quick, funny videos. However, recently concerns have been raised about whether the app is secure. We’ll explain what these concerns are, then cover what steps you […]

Continue Reading