Do you have what it takes to manage your own security?

Do you have what it takes to manage your own security? Now that the World Wide Web has turned into the Wild Wild West, residential and commercial users alike face more security threats than just viruses. Programs need regular updates to install patches. Change passwords a regular basis. Run malware scans from multiple sources to…

Some Of The Best Things In Security Are Free

  Some of the best things in life are free, right? But what if I told you some of the best security for your computer is also free, would you believe me? It’s true, out of all the titles for antivirus and anti-malware programs out there we have the paid versions and the free versions.…

Malware: Why It’s Still One Of The Biggest Threats Facing Businesses

  Posted by: A Geek To Go, LLC – advanced malware prevention and remediation solutions for business and home. Although the origin of the first computer malware is still debated, one thing has remained constant: Since its inception, malware continues to be one of the biggest threats facing today’s businesses. According to data from Verizon’s 2018…

New Malware Is Undetectable: DNS Hijacker Targeting Apple macOS

New Malware Is Undetectable: DNS Hijacker Targeting Apple macOS   A security researcher has revealed details of a new piece of undetectable malware targeting Apple’s Mac computers—reportedly first macOS malware of 2018. Dubbed OSX/MaMi, an unsigned Mach-O 64-bit executable, the malware is somewhat similar to DNSChanger that infected millions of computers across the world in 2012. DNSChanger  typically…

Google Drive Exploited to Download Malware Directly from URL

While the malware was discovered on Google Drive, any cloud-share service such as iCloud, Dropbox, etc. could be vulnerable. Proofpoint uncovered the vulnerability in Google Drive a portal for many useful G-centric apps. Unfortunately, the normal document-sharing capabilities built into Google Apps can be manipulated to support automatic malware downloads. It works like this: After…