Archives - Vulnerability


Stay protected while connected

The bottom line is that whenever you’re online, you’re vulnerable. If devices on your network are compromised for any reason, or if hackers break through an encrypted firewall, someone could be eavesdropping on you—even in your own home on encrypted Wi-Fi. Practice safe web surfing wherever you are by checking for the “green lock” or […]

Phishing — It only takes one time

Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

How do you find out what software updates you need to install?

When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect your computer, phone, or other digital device against attackers who would take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available. Some software […]

What is a Zero-Day Attack?

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is alleviated, hackers can exploit it to negatively affect computer programs, data, additional computers or a network. An exploit directed at […]

Use encrypted email if you regularly send sensitive data

You might think email is relatively safe, but it’s an old set of protocols with many vulnerabilities. Consider using encrypted email for full protection – messages sent through these services are completely unreadable by anyone without your key, although using it can take some getting used to.

Keep your mobile apps and operating systems updated

Outdated applications and OSes are magnets for malware, since they often have known vulnerabilities that can only be fixed by upgrading. If you see a new version is available, install it right away. Some platforms, such as Apple iOS, even allow you to automatically schedule security updates so you don’t miss a crucial change.