Archives - Malware


Lookout for spoofed hyperlinks and websites

If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain […]

Be aware of cryptojacking

Malicious cyber actors use cryptocurrency-based malware campaigns to install cryptomining software and hijack the processing power of victim devices and systems to earn cryptocurrency. Cryptojacking may result in the following consequences to victim devices, systems, and networks: Degraded system and network performance because bandwidth and central processing unit (CPU) resources are monopolized by cryptomining activity; […]

Cybersecurity tips for avoiding malware while working from home

It’s important to think carefully about changing your habits to work from home in a way that’s productive, collaborative and, perhaps most importantly, secure. Hackers are interested in exploiting new vulnerabilities as employees disperse. A March 2020 survey of the CNBC Technology Council found that 36% of respondents at that time already saw an increase […]

Be suspicious of unexpected emails

Phishing emails are currently one of the most prevalent risks to the average user. The goal of a phishing email is to gain information about you, steal money from you, or install malware on your device. Be suspicious of all unexpected emails.

When your computer gets infected with malware, remove it from the network

Malware can spread from one device to another under the same network, so it’s important to isolate computers, phones and other devices once they get infected. Disable the compromised one from all networking capabilities, such as Wi-Fi and Bluetooth, then reboot all your devices.

What are the risks to having poor cybersecurity?

There are many risks, some more serious than others. Among these dangers are malware erasing your entire system, an attacker breaking into your system and altering files, an attacker using your computer to attack others, or an attacker stealing your credit card information and making unauthorized purchases. There is no guarantee that even with the […]