As of June 23rd, 2017 the technology, security, compliance, and business strategy blogs have moved to the updated Crossroads Technologies website.
In late May of this year, a new cyberattack technique was discovered that delivered malware via the mouse hover feature in PowerPoint files. This technique debuted in a spam campaign that targeted the United Kingdom, Poland, Sweden, and Netherlands.
Recently, the ransomware attack dubbed “WannaCry” made global news as it spread across more than 150 countries, infecting hundreds of thousands of devices. A few things made this ransomware attack interesting, such as the operating system the majority of the victims were running.
While Androids may be more susceptible to viruses, Apple products are not impervious to attacks. The reality is that any smart device can be infected with a virus and users should take precaution when downloading apps or files. If your device has already been infected, there are a few ways to recognize the intrusion.
Satya Nadella was selected as CEO of Microsoft in February of 2014, and since then he has brought about tremendous changes. Not only has he created success in many unexpected ways for the company, but he’s recreated Microsoft for its employees. They went from feeling pressured to compete with one another to feeling valued and unified, working to empower all towards innovation. So what is it about Nadella that makes them want to follow him?
There is a flaw to the Samsung Galaxy S8 that is worrisome for end-users. After the Galaxy Note 7 battery issue, this latest Samsung offering has a lot to live up to. According to many reviewers it has exceeded expectations for the design and functionality, but not for security.
In recent years we have been seeing a surge of cyberattacks in all industries, but one specifically is really feeling the heat. Due to the sensitive nature of their work, the healthcare industry is particularly susceptible to cyberattacks like ransomware. Ransomware is a form of malicious software that locks users out of their data and threatens to destroy the data if a ransom is not paid. Cybercriminals can not only make a profit by forcing a provider to pay for important files to be decrypted, but they stand to gain a political or socioeconomic upper hand by tarnishing the reputation of certain health organizations.