Security

Not all skills used by hackers and cybercriminals relate to computing. In fact, when coding gets a hacker nowhere, they turn to a classic technique used by scammers and con artists: social engineering....
Jul 17, 2023
8 min read
Red hat hacking: Understanding the vigilante hacker (Header image)
Hackers wear many “hats.” There’s black hat hacking, but there’s also white hat, green hat, blue hat, red hat, and others. Some do it for the money. Others seek to cause havoc and...
Jul 17, 2023
10 min read
What is WebHelper, that suspicious process in your Task Manager? (Header image)
Is your computer running slow? Do you see too many ads and pop-ups? If so, your Mac might be infected with WebHelper, one of those malicious apps that has given users worldwide nothing...
Jul 17, 2023
5 min read
What is Wave Browser and how do you remove it from your Mac? (Header image)
What do you get when you combine a browser hijacker with adware, spyware, and a program that can self-install and make changes to your computer? Wave Browser is what you get. While some...
Jul 17, 2023
5 min read
Locky 101: What you need to know about the 2016 ransomware (Header image)
Locky, the ransomware malware introduced in 2016, has infected millions of users worldwide, affecting Mac and Windows operating systems alike. While the original Locky is not active, some variants are still out there...
Jul 17, 2023
9 min read