TCT News

Wireless Security Network Update

On October 16, 2017, Belgian security researchers made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to attacks on wireless networks. Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these...
Read more

Bad Rabbit Ransomware Attack

On Tuesday, Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. The initial installer masquerades as a Flash update but is believed to be an updated version of NotPetya, since the infection chain and component usage is identical. ...
Read more

5 Phases of a Cyber Attack

No one has resources to do everything perfectly. In cyber security, your goal should be constant improvement. Knowing your enemy’s objectives helps. What happens in each phase of an attack? Here, F-Secure Cyber Security Team lay it out for us:   Phase 1: Recon Timeline: months before detection The attacker’s...
Read more

F-Secure Declares That ‘Parental Control’ Is Dead

F-Secure’s flagship products now enable parents to set boundaries online the way they do in the real world. F-Secure now offers protection for the whole family with the latest version of its flagship products SAFE and TOTAL. The new Family Rules feature available in both products help families stay safe...
Read more

What Version of Office are you using?

In 3 months’ time (Oct 2017), all support for the Office 2007 ends. This means Microsoft will no longer supply patches for security vulnerabilities or fixes for other bugs, nor will it provide company-assisted technical support, whether free or paid, such as by-phone consultations or trouble-shooting. Is your business still...
Read more

Backing up Office 365

Moving to Microsoft Office 365 platform is a great way to enable your staff flexibility to work anywhere, but also for the saving it has on hardware. But while there is many advantages of migrating to Office 365, there is a side that is not explained and that is that...
Read more

Exponential Growth Expected for Ransomware

Ransomware currency, Bitcoin is providing a viable and lucrative avenue for cyber criminals to make a living. It is funding a new online crime wave that has seen new extortion-enabling malware families at least double each year since 2012. There was one known ransomware family variant in 2012, according to...
Read more

3 Ways to Spot Phishing Emails

New phishing scams plague businesses every single day. And spear-phishing campaigns are becoming increasingly sophisticated. Phishing is more than just the obvious scams you find in your spam folder. And even if something does get through, surely everyone knows that poorly written emails asking for your bank account info or...
Read more

Apple Mac End Point Protection by F-Secure

In today’s advanced security environment, no device is safe unless it has the proper end point protection. The old myth of Macs not requiring protection against ransomware, backdoors and other software vulnerabilities is fading away. Advanced persistent threats are becoming increasingly focused on Macs due to Apple’s popularity among senior-level...
Read more

World Backup Day – 31st March

Today, Friday 31 March is World Backup Day, a day to not only backup all your files, but a day to think serious of implementing a better backup plan. In today’s digital environment and all the cyber crime around, you need to have multiple ways of backing up your company...
Read more