Archives - Malware


Smart devices need smart security

As the Internet of Things (IoT) continues to emerge, the stakes are high for ensuring that all apps, devices and wireless networks in your home are secure. From thermostats to doorbells, many in-home appliances can now connect to the internet, meaning that there’s also the risk of them becoming infected by malware or otherwise attacked. […]

Lookout for spoofed hyperlinks and websites

If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain […]

Be aware of cryptojacking

Malicious cyber actors use cryptocurrency-based malware campaigns to install cryptomining software and hijack the processing power of victim devices and systems to earn cryptocurrency. Cryptojacking may result in the following consequences to victim devices, systems, and networks: Degraded system and network performance because bandwidth and central processing unit (CPU) resources are monopolized by cryptomining activity; […]

Cybersecurity tips for avoiding malware while working from home

It’s important to think carefully about changing your habits to work from home in a way that’s productive, collaborative and, perhaps most importantly, secure. Hackers are interested in exploiting new vulnerabilities as employees disperse. A March 2020 survey of the CNBC Technology Council found that 36% of respondents at that time already saw an increase […]

Be suspicious of unexpected emails

Phishing emails are currently one of the most prevalent risks to the average user. The goal of a phishing email is to gain information about you, steal money from you, or install malware on your device. Be suspicious of all unexpected emails.

When your computer gets infected with malware, remove it from the network

Malware can spread from one device to another under the same network, so it’s important to isolate computers, phones and other devices once they get infected. Disable the compromised one from all networking capabilities, such as Wi-Fi and Bluetooth, then reboot all your devices.