Archives - Cyberattack


Use a two-way firewall on your Mac

The built-in firewall on your Mac only provides inbound protection, which prevents cyberattacks from threats outside of your network. By installing a two-way firewall, you’ll have outbound protection as well, which keeps malware that’s already in your system from being able to connect to the internet.

Create a plan for dealing with cyberattacks

Once your system is infected with malware, there are steps you can take to fix the problem and prevent it from happening again. Disconnect from your network, reboot the device, download a virus scanner, and delete any old applications and files you don’t need.

How to protect yourself from cyberattacks during the coronavirus pandemic

The spread of COVID-19, aka the novel coronavirus, has had a profound impact on businesses and organizations across the globe. In order to help contain the virus, employers are doing their part by encouraging, or even requiring, workers to stay home and work remotely. With much of the workforce doing their jobs from home, there’s […]

Remove legacy plugins such as Flash and Shockwave

Plugins used to be essential to many rich web applications, but they’ve gradually been supplanted by technologies included in HTML 5. While some sites still require add-ons like Flash, it’s more efficient and safer to uninstall them, especially considering that Adobe – which makes Flash and Shockwave – has already announced their discontinuation. Doing so […]

What’s a Cyberattack?

A cyberattack is any type of offensive maneuver employed by nation-states, individuals, groups, society or organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

A guide to defending yourself from advanced phishing attacks

The word “phishing” might conjure up images of relaxing by a lake or stream to catch some fish, but there’s nothing laid-back about it. Phishing campaigns lure you with seemingly must-click offers – anything from get-rich-quick schemes to insistent security updates – and then steal your personal data. While phishing is among the oldest and […]