What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what you can do to keep your device safe. …Log into your iPressGo account to read the full article.

The Backdoor Bill that could be Unsafe

Over the last few years, law enforcement agencies around the country have often battled with tech companies over the use of encryption on devices like smartphones and tablets. It is in a company like Apple’s best interest to keep users data private and safe – to the point where encryption is so strong that tech companies have no way to …

NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and Citrix users. While many assume hackers are targeting government agencies, the truth is these vulnerabilities can affect even the smallest of businesses. As a small or medium business, it’s important to address known vulnerabilities …

Securing Facial Recognition Data and Potential Risks

As federal agencies and local law enforcement continue to use facial recognition to probe for potential suspects it is also considered to be an invasion of privacy. …Log into your iPressGo account to read the full article.

Linux Users Should Be On High Alert For Drovorub Malware Attacks

Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub malware, especially when using RDP. …Log into your iPressGo account to read the full article.

Google Releases a version of iPhone AirDrop on Androids

By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works on devices specifically manufactured by Apple and is therefore the centerpiece of that company’s “walled garden” ecosystem. …Log into your iPressGo account to read the full article.

Protecting Global Networks and Identifying Threats

As the dark web becomes multi-national, US government agencies are racing to identify who are responsible for the latest ransomware attacks. …Log into your iPressGo account to read the full article.

Vishing Scam Is Targeting Telecommuters

A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do to avoid becoming the next victim. …Log into your iPressGo account to read the full article.

How Contact-Tracing Apps Work

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate. …Log into your iPressGo account to read the full article.