This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

Cyber Security

New Scam of the Week – Valentine’s Day Scams

By | February 13th, 2017|Categories: Cyber Security|Tags: , , |

It's Valentine's Day and the scammers are out in full force... again. There are many ways these online criminals try to trick you, but the most common are phony florists, online dating scams, phony electronic greeting cards and delivery scams. So, here are the red flags you need to look out for. Do not trust emails or [...]

Scary Double-Ransomware

By | December 12th, 2016|Categories: Cyber Security|Tags: , |

Sophos reported on one of the more scary ransomware strains we have seen lately. It's called Goldeneye and encrypts the workstation twice: both the files and the Master File Table (MFT). It's a phishing attack with two attachments. One is a PDF and the other an Excel file. The Excel file contains a loader that [...]

Avoiding Holiday Scams

By | December 5th, 2016|Categories: Cyber Security|Tags: , , |

by Matt Haring   Phishing scams are a menace. At least one in 10 people fall for phishing attacks in the workforce. This rate of success spells trouble for businesses. But consumers are not safe from phishing attacks, either. Mobile banking trojans like Android.Fakelogin and scammers impersonating online travel agencies like Hotels.com and Travelocity are already targeting users for [...]

Fake News: A Content-Based Social Engineering Attack

By | November 28th, 2016|Categories: Cyber Security|Tags: |

Facebook, Google, and Twitter have recently been accused of promoting fake news stories. Depending on your sources and who you believe, fake news played a role in the 2016 presidential election. However, fake news is misused in a number of ways: Propaganda, trying to influence opinion Direct attacks on a political opponent Stock manipulation scams [...]

5 Ways to Shop Smart on Cyber Monday

By | November 28th, 2016|Categories: Cyber Security|Tags: |

Happy Cyber Monday! Today is a great day to find savings, deals and specials on your favorite e-commerce sites and outlets. And while it’s hopefully a bit less hectic than Black Friday, it’s important to make sure you’re being careful when browsing and buying via the web—and doing everything you can to protect yourself from [...]

Microsoft Announces Major Patching Changes

By | November 4th, 2016|Categories: Windows|Tags: , , , |

Microsoft has recently updated their decades-old standard patching process, which amounts to what some have called a “seismic” shift in the process. Now, windows patches will be deployed in a cumulative patch, without giving users the option to select and choose (or reject) individual patches throughout the process. Stay tuned to our blog for more [...]

Five Spooky Cybersecurity Statistics

By | October 31st, 2016|Categories: Cyber Security|Tags: |

Happy Halloween! In this special edition post to our blog we look at five spooky cybersecurity statistics.  The insights here are pulled from Webroot’s 2016 Threat Brief and offer valuable—and sometimes scary—insights into today’s IT security landscape. 100,00 net new malicious IP addresses were created per day in 2015 Companies like Google, Apple and Facebook were targeted [...]

Operation Ghoul: Attacks Being Targeted On Engineering Organizations

By | September 14th, 2016|Categories: Cyber Security|Tags: |

by: Matt Haring   Kaspersky has observed new waves of attacks against the engineering and industrial industries. These have been highly active in the Middle East region and unveiled ongoing targeted attacks in multiple regions. The attackers try to lure targets through spear phishing emails that include compressed executables. The malware collects all data such [...]