Quick Marty! Hop into the DeLorean! Let’s time travel back to a simpler time, back in the late 90’s!Back then, you could walk into any store that...
Reciprocal Technologies Blog Malware • Page 4
New Mobile Malware Is a Threat to Your Device
Mobile devices haven’t been known to have a lot of faults when it comes to security, but when a really bad malware attack does happen, the best...
Ransomware Revisited
Ransom: a sum of money is demanded in order for the release of goods.Software: the programs and other operating information used by a computer.What...
Your Guide to the Malware You Could Encounter
You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they...
Phishing Attacks and How to Avoid Them
Phishing attacks are the bane of modern businesses, and any organization’s employees need to be cognizant of the threat they pose. Unfortunately, no...
Google Play Works to Reduce Ad-Fraud
What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous...
A Look at this Year’s Worst Cybercrimes
It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that...
Surveying the Damage of Meltdown and Spectre
At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately,...
Email Malware is the New Schrӧdinger’s Cat
There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the...
A DDoS Attack Hits Your Productivity and Profits
How quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the...