Antivirus, Crypto Currency, Enterprise, GDPR, Internet Security, Social Media

9 Biggest Hacks/Leaks of 2017

2017 was a year where nothing seemed safe. Bombshell hacks and serious security breaches were experienced both in the Government…

2017 was a year where nothing seemed safe. Bombshell hacks and serious security breaches were experienced both in the Government and private sector.

2017 was hit with a high number of cybersecurity meltdowns ranging from stolen credit card numbers to global ransom campaigns that cost private companies millions of dollars. As we do more and more of our businesses online, hackers too are developing sophisticated ways of either spreading ransomware or stealing crucial data that is vital for our businesses and government operations.

In a report released by Bitdefender, it was found that ransomware payments doubled in 2017 hitting a record $2 billion as compared to 2016. According to Trend Micro, if the trend continues, there’s a high possibility that ransomware will most likely hit $9 billion by the end of 2018. With that being said, this article will outline and explain 9 of the biggest hacks and data breaches of 2017.



Credit reference agency Equifax revealed that approximately 143 MILLION of its US customers information was breached in May of 2017. This most vital information exposed by this leak was the social security numbers of its 143 million American users. Other information revealed included names, birth dates, addresses, and drivers license numbers. As many as 209,000 users had their credit card numbers exposed also.

Due to the nature of the information revealed, all of its users are now potential targets for identity theft. It was recommended that any affected by the breach put a freeze on their credit report to prevent further damage.

The hack didn’t only include American users. It was revealed that limited information was also leaked regarding British and Canadian users. Four main groups of UK users were identified, this included almost 640,000 phone numbers and 30,000 driving license numbers. 12,000 users email addresses and 15,000 Equifax membership details were also exposed.

This massive data hack led to the resignation of the company’s chairman and CEO, Richard Smith.

There was also some controversy regarding the timing of the company’s statement about the hack. Several high ranking members of the firm exercised their right to sell off stock options worth millions of dollars between the time the breach was discovered and it was revealed to the press.



Although this story started as early as August 2016, the majority of the damage caused was revealed over the course of 2017. The Shadow Broker hacking group had been releasing classified information believed to be from the NSA via Twitter and Pastebin. The information contained within asked for criminals to send bitcoin bids in return for hacking tools used by the NSA.

On April 8 2017, the group released the hacking tools they claim to have stolen from the NSA’s own Equation hacking Group. In total, they released more than one gigabyte of software used to exploit Microsoft products. By the time that the group released the NSA’s leaked hacking tools, Microsoft had already patched all of the 0-day exploits they utilized.

The hacking tools weren’t the only thing that the notorious hacking group appears to have stolen from the NSA. They have revealed other information such as the 2017 Shayrat Missile Strike, President Trump’s attack against a Syrian Airfield.



ransomwareFollowing on from the release of the NSA’s hacking tools, we have the 12 May 2017 ransomware attack on the UK’s National Health Service. The NHS became the target of a fast-spreading ransomware called WannaCry. This ransomware encrypted the computer’s data and demanded a payment in the untraceable cryptocurrency, bitcoin. The WannaCry attack was created off the back of the exploits released by the Shadow Brokers previously.

Even though Microsoft had patched all of the 0-day exploits used in the NSA’s tools, the NHS still had thousands of computers not updated. This led to over one-third of NHS organizations being disrupted, with thousands of NHS computers infected by the ransomware. Eventually, a kill switch was found for the ransomware which meant that devices were no longer locked.

Due to the scale of the attack, thousands of appointments and operations were canceled. The effect of the attack was still being felt weeks later as a huge backlog had been created.


US Voter database

In June 2017 more than 198 Million US voters personal information was leaked. This information wasn’t hacked but instead was available to browse due to a security misconfiguration. The database was stored on Amazon S3 servers by data firm Deep Root Analytics. Although the information revealed by this leak isn’t much more than what is publicly available already, the sheer volume of aggregated data makes it valuable to would be cybercriminals.

The leak was discovered by Chris Vickery of security analyst firm UpGuard. A large part of the company’s research involves scanning the internet for any publicly accessible information. This led to the firm not only finding the US voter database but also databases relating to Mexican and Philippine voters.

Macron Campaign

Another political entry into our list is the “massive and coordinated” hacking attack on now French President, Emmanuel Macron. In the last few days run-up to election day May 2017, several gigabytes of information was uploaded to document sharing site Pastebin by an anonymous poster. The Macron campaign team revealed that tens of thousands of internal emails, along with other documents had been breached. The files were initially spread on 4chan, a site which is popular with far-right leaning posters.

The En Marche! campaign team claimed that this was no the first time that they had come under attack. A statement claimed they had “consistently been targeted by such initiatives” during the entire presidential campaign of 2017. They also claim that many false documents had been added to the leak in an attempt to spread disinformation.

Due to the timing of the hack, neither presidential candidate could comment on the subject. This was due to Frances laws on presidential campaigning, which ban communications before the polling stations opened.


February 2017 saw a security bug in the popular content delivery network, Cloudflare, expose millions of users data. The leak, named Cloudbleed after the infamous Heartbleed bug discovered in 2014, exposed data such as passwords and security tokens.

The cloudbleed bug was discovered by Google Project Zero research, Tavis Ormandy. He discovered a buffer overflow issue in Cloudflare’ servers that meant that sensitive data could be returned by the proxy servers accidentally. This data was then being cached by search engines such as google.

In response to the bug, Cloudflare disabled several of its features – Email obfuscation, server-side Excludes and HTTPS rewrites to stop the leak. The company didn’t notify its users by itself, Ormandy followed policy and waited seven days before releasing his findings publicly. Following this public release Cloudflare confirmed the security flaw whilst also reassuring customers any information would now have been flushed from search engine caches.


Chris Vickery of UpGuard pops up again after discovering a Verizon customer database unprotected from public access. This database was stored on Amazons S3 cloud servers by a third party vendor used by Verizon, NICE systems. The database contained sensitive information for up to 6 Million Verizon customers. Information such as PIN codes to verify customers were listed, alongside the customers’ phone numbers. This information is enough for anyone to access any of the Verizon customers accounts, even with two-factor authentication enabled.

With access to a customers account, cybercriminals could potentially add extra lines to a Verizon account leading to extra unwanted charges. The database was created from information gleaned when people contacted customer service over a 6 month period. Both business and residential customers data was exposed in the leak.

It turned out that the leak by NICE System had occurred when they uploaded the database to the S3 service and marked it as public. Verizon did not offer a way to check if a users PIN was exposed, although it did recommend that all users change their PIN as a precautionary measure.


One of the biggest hacks of 2017 technically took place in 2016. Ridesharing app Uber concealed the breach of 57 million customers personal data in October 2016 by failing to notify both its users and also regulators.

Like other hacks we saw in 2017, the information taken was stored on a third-party cloud service. This information was reportedly accessed by two hackers and in a surprising move, Uber decided to pay the hackers a ransom of $100,000 (£75,000 at the time) to delete the data and keep quiet about the information.

The information stolen included users names, phone numbers, and email addresses. Drivers for the firm had more sensitive information taken including their driving license numbers. Uber confirmed that highly sensitive information such as date of birth and social security numbers were not revealed during the hack.

Ubers chief executive Dara Khosrowshahi stated, “None of this should have happened, and I will not make excuses for it”. Uber stated at the time that it was actively monitoring the situation and Uber’s then chief security officer Joe Sullivan was forced to resign.


2017 saw the acquisition of internet giant Yahoo by Verizon Communications. Unfortunately, it also saw Yahoo release information about the biggest data breach in history.

Yahoo had revealed information about a data breach before it’s acquisition which lead to a drop in the acquisition price of over $300m. Verizon then went on to hire external forensic investigators and new information came to light.

Verizon revealed in October 2017 that information from over 3 billion Yahoo accounts had been stolen in August 2013. Data taken included names, email addresses, and hashed passwords but no financial information of its users. Unencrypted user security questions were also breached. Yahoo sent emails to affected accounts and prompted all users to update their passwords at the time.

Experts have stated that it is common for data security breach estimates to be initially on the lower end, but I do not believe anyone would have guessed that 3 billion accounts could be breached at one time.

To conclude…

Apart from the 9 biggest hacks of 2017 listed in this article, there were many other major security breaches that took place in the past year. Among these we didn’t mention include the HBO data leak, the Kaspersky controversy, the River City Media leak, the LastPass hack and finally, the Sony Pictures hack.

Looking at a majority of these security breaches, you’ll discover that data was lost through rather straight forward exploits. Unfortunately it doesn’t matter how vigilant you are with your data, until big business takes security seriously then we are all at risk. Lets hope for a safer 2018.

Be the first to write a comment.

Leave a Reply

Internet Security, Social Media

8 Tips to Protect Your Browsing Privacy

Online privacy is a hot topic recently with the influx of news stories about Facebook and Cambridge Analytica possibly misusing…

Online privacy is a hot topic recently with the influx of news stories about Facebook and Cambridge Analytica possibly misusing users data. Although the news stories are highlighting to people just how much Facebook knows about them, they are not the only company that keeps track of things you do online!

Virtually every interaction that takes place in a web browser is tracked in some way. There are many ways in which you are tracked online, IP address, browser cookies, HTTP referrer headers, browser fingerprints and user agents. All of these things make it possible to trace everything you do online.

Unfortunately, the majority of people are happy to hand out way too much information about themselves too – their location, their relationships and much more online.

For some users, browsing privacy is only just becoming a priority when they are online. Fortunately, we have compiled some tips, add-ons/browser extensions to try and minimize the amount of information available about you and your browsing habits.


Stop oversharing – Take your browsing privacy seriously


Our first and most obvious tip, stop oversharing your information online willingly! Whenever you disclose information online it is there forever. Whether this is on facebook, twitter or other social media try to simply not share information that is not relevant.

Simply customizing your social media settings to restrict who can see what you share is a good starting place.

Turning off location tracking in apps and your google account settings should be your next step.

Unfortunately, information shared willingly only scratches the surface of data that is stored about you online.


“Do Not Track”


All modern web browsers have the ability to toggle on a “do not track” option. This option is a W3C standard that tells websites, when enabled, to stop their user-tracking and disable cross-site user tracking.

An example of this would be targeted adverts. If you have ever been browsing for an item, an electric toothbrush, for example, you may have noticed that for weeks after you see lots of adverts or more electric toothbrushes. This example would not happen if a user had the “do not track” option enabled in their browser.


Ad Blockers


To avoid seeing adverts and many user tracking scripts at all you can simply install an ad blocker. There are many options available to you, common and powerful choices are Ad Block Plus ( and uBlock Origin (


Disable browser scripts


A slightly more aggressive way of blocking user tracking scripts is to install a browser add-on/extension that disables them all by default. No Script ( and ScriptSafe ( are the most common options available.

By default, these extensions will block all Java, JavaScript, Flash and other tracking scripts generated by the site you are visiting. This “white list” approach can break some website until you enable certain scripts but it does give you the freedom and security of having everything off by default.


Become an online ghost with Ghostery –


Ghostery is a browser extensions/add-on that provides a safer way to browse online. It offers a wide range of features such as enhanced ad-blocking, enhanced anti-tracking, and smart blocking. By default, it blocks thousands of known user tracking scripts. Ghostery offers control over your browsing privacy by allowing you to run individual tracking scripts if for some reason you need them.


HTTPS Everywhere –


HTTPS Everywhere is another browser extension/add-on that encrypts your data sent to many major websites.

Although most communication to websites nowadays is done through HTTPS, some information you send may sneak through in an unsecured, un-encrypted form. This is where HTTPS Everywhere steps in – It steps in and takes these unsecured HTTP requests and encrypts them.


Mozilla Facebook container –


Following on from recent news stories, the Mozilla foundation has launched their Facebook container. When installed it will delete all of your previous Facebook cookies and ask you to log in using the container tab. It acts like a normal browser tab but with one important difference – Any Facebook activities are isolated from other browser activity.

Any websites with embedded Facebook widgets, such as like or share buttons will not work as your account login is contained inside the Facebook container tab. This makes it so that Facebook loses the ability to track your browsing activity outside of Facebook. A simple yet efficient way of restoring some browsing privacy to your daily Facebook session!


VPN (Virtual Private Network)


In one of our previous articles – Do I need a VPN for 2018 We discussed the pros of a VPN for the average user. The main point that we took from the article was that by having a VPN you are ensuring that all your online browsing information is invisible to your ISP.

A VPN will stop your ISP spying on your online browsing activities but is not a golden bullet to online browsing privacy. Using a (reputable!) VPN in conjunction with some of the add-ons/extensions mentioned in this article would be a very powerful combination to stay safe online.



Continue Reading
Android, Antivirus, Apple, Chromebook, Enterprise, Internet Security, Microsoft, Mobile, OS X, Windows

Is Buying Antivirus Software Necessary?

Let’s address the elephant in the room – malware and viruses do exist! Devices are not immune so we have…

Let’s address the elephant in the room – malware and viruses do exist! Devices are not immune so we have to ask “Is Buying Antivirus Software Necessary?”! It is worth noting that if your phone, tablet or computer is invulnerable to internet threats today, it isn’t a guarantee it will stay so forever.

Having said that, let’s discuss why viruses are immensely prevalent on some platforms while on others they are almost non-existent.

First and foremost, we need to understand that cybercrime is a lucrative business. Hackers are always in search of ways to sneak in into users’ systems and capitalize on sensitive information.

While most vulnerabilities till now have been centered around the Windows OS, other system software like that of Apple’s isn’t as protected either as it once used to be.

It’s not that there are issues with Apple’s inbuilt security system, but rather, cyber culprits have found new ways of slipping through advanced defense systems. The reason why they have started out so late is that they were pretty content targeting the much easier and larger number of Windows and Android users till now.

Though Apple’s security is pretty impressive, it isn’t completely immune. For cybercriminals exploiting the system, it is just a matter of time.

As of now, Apple doesn’t really have antivirus software for the iOS and the same goes for Google’s Chrome OS, one of the most secure systems to date.

The few apps that claim to protect devices running on these operating systems are probably Security Software. So, for the time being, we will focus our attention on Windows, OS X, and Android systems.


Windows PCs and Laptops


Before progressing any further, let’s answer the simpler stuff first – Is buying antivirus software necessary for windows 7 or older?

The answer is simple and straightforward – YES, IT IS!

Now back to what’s more popular: What about Windows 8 and Windows 10?

While Windows 8 and above have had some significant improvements in their security system, especially after the introduction of Windows 10 with which Windows Defender Antivirus (a step-up to the Microsoft Security Essentials) comes included, the everlasting question whether one needs an additional antivirus software or not still remains unanswered.

Before passing any judgment, it must be noted that Windows Defender switches off gracefully once it detects a third-party program to avoid any interference. Hence, you once an antivirus software is installed and running the Windows Defender isn’t going to work any longer. Unless you are confident with your antivirus software, it is best letting Microsoft’s default defender do the job.

While Windows Defender if good, it certainly isn’t the best! According to AV-TEST, Microsoft’s inbuilt security program score a 4.5 out of 6. Of course, it isn’t bad but not as capable as Avira’s or Avast’s antivirus software that topped the list in December 2017.


Mac OS X Desktop Computers and Laptops


For a long time, Mac OS X was incredibly safe. Apple’s intelligently designed sandbox OS made it extremely difficult for criminals to hack Apple devices.

As a matter of fact, if a few years ago a Mac user would install an antivirus software, the only purpose it would solve was preventing it from passing to other devices on the same network. However, Macs have been cracked and have lately been more vulnerable to threats like never before.

For now, home users are pretty safe from being affected by a malware or a virus. Even though not many Mac users have been affected by a virus, it wouldn’t be right to forget that the risks are there.

To be on the safer side, it wouldn’t be a bad idea investing in an antivirus. Just like for the Windows, antivirus software from Kaspersky, Symantec and Avast do an impressive job of protecting Apple devices.


Android Phones and Tablets


It wouldn’t be safe to say that Android viruses do not exist at all. However, as long as one refrains from downloading apps from external sources, it is almost impossible your device to be infected by a virus or malware.

While, by default, Google doesn’t allow its Android users to installs apps from third-party source, this can be easily modified through a few steps in the settings. If you regularly install apps from unknown sources or are one of those courageous users who fiddle with their devices by gaining root access, having an antivirus installed wouldn’t be a bad idea.

It must be noted, that the Android threats known till now aren’t as malicious as the ones affecting Windows PCs and Laptops. This is mainly because it isn’t as easy to exploit an Android device and there isn’t much reason to do so as most of the sensitive information that hackers are in the hunt for is one computer.

As of now, there hasn’t been an Android malware that has caused booting issues for a device. Even if one feels his Android phone or tablet has been affected by a virus, all he has to do is back up his data and run a factory reset.

While having an antivirus might seem something optional, one might not regret having a security software instead installed on his Android.

What is important to keep in mind is that Android runs on devices that have a tendency to get stolen. Losing a phone or a tablet is quite daunting indeed. But giving away sensitive information is even worse. And, that is where security software plays a crucial role.


Is Buying Antivirus Software Necessary or will a free version suffice?


While free antivirus software today, like the Sophos Antivirus, protect devices from threats to a good degree, they are obviously nowhere near to what the paid ones are capable of doing.

Whether or not to pay for an antivirus or whether even having one is required is a highly personal opinion and there are certain things that are to be considered while making such a decision. If of course, you have important data on your device, something you cannot afford lose an inexpensive antivirus is worth adding to the expense.

For some suggestions on which antivirus to pick, check our article – Top 5 Antivirus programs for 2018

Continue Reading
Crypto Currency

The Top 10 Tools for Managing your Crypto Wallet

Buying and Selling Cryptocurrency is relatively straightforward, there are a huge number of guides available online which make the process…

Buying and Selling Cryptocurrency is relatively straightforward, there are a huge number of guides available online which make the process very clear. However, storing and managing your crypto wallet can be a lot more confusing.

Whilst Crypto is stored in a wallet, there are many different types of wallet available all with different features and levels of functionality.

The vast majority of holders of Crypto use ‘hot’ wallets which are software programs which are connected to the internet at all times. They are the most readily available and the easiest to set up. This is especially true of those new to the Crypto market.

This article aims to provide the majority with some insight into the top tools available to help manage Cryptocurrency.

Here we go!

Increase Security

One of the most useful tools for managing your Crypto, especially if you are new to the market is a ‘cold’ wallet, one that it is not connected to the internet.

Currently, the most widely used and tested ones are –

Ledger Nano S

This is a smooth, strong, safe and affordable hardware wallet and one of the most competitively priced. Widely used, it is a multicurrency wallet integrated into a smartcard device.

It is very light and easy to use. To use it you simply connect it to a USB port and you are ready to go. It works on any computer, regardless of the operating system.


One of the best-known hardware wallets. It supports the major Cryptos so would work well as a Bitcoin Wallet or an Ethereum Wallet. There is full support for Windows (version 7 and higher), OS X (version 10.8 and higher) and Linux.

You can also use your TREZOR with Android devices which have USB On-The-Go. Trezor is considered to be one of the most secure ‘cold’ Crypto wallets available on the market today with complex security.


KeepKey works with the wallet software on your computer by taking over the management of private key generation, private key storage, and transaction signing. KeepKey generates a private key using its hardware-based random number generator, combined with randomness provided by your computer.

Once your private key is generated, you are given the one-time opportunity to write down a backup of your KeepKey in the form of a twelve-word recovery sentence. This is one of the simplest wallets to use an is widely available in major online retailers.


This well established French company with many years’ experience also recently launched a hardware wallet. Many of the features to be found on popular hardware wallets such as the Ledger Nano are replicated here, including the ability to generate a private key and support for a range of currencies.

Bitcoin, bitcoin cash, ethereum, litecoin, and zcash will all be supported, with more to be added. The device can also be used to add an additional layer of security to other third-party wallets.

Manage Your Portfolio


If you are one of the many people that hold Crypto across multiple wallets, then this may be the tool for you.

This is an excellent mobile app that aims to assist you to manage your portfolio of Cryptos across multiple wallets. With this app, you not only enter what your holdings are but where they are stored. This may seem like an unusual feature but, it is an excellent one.

It allows you to monitor how much Crypto you have stored in ‘hot’ wallets giving you the opportunity to move them into a ‘cold’ wallet for greater security. This can be an important thing to monitor given how rapidly Crypto values can change.


This is a platform which you can also use to track your crypto across all exchanges and wallets. CoinTracker automates this process. You start by connecting it to every exchange you use (once it’s supported by the software) and can also add the public address to any wallet that holds Bitcoin, Ethereum, Litecoin, and Dogecoin.

It will automatically read the balance and update it in your portfolio. A useful tool to manage your Bitcoin wallet and Ethereum wallet in particular as these can contain very high values depending on when you entered the market!

Increase Trading Speed


If you use a ‘cold’ wallet then you are aware of the disadvantages. You may not have it with you when markets change especially when you want to dispose of some Crypto quickly, or even buy more. The potential solution here is SikurPhone.

This is a very high security mobile phone with a built in Cryptocurrency wallet which can be used as a Bitcoin wallet or Ethereum wallet for example.

Don’t get caught out by the markets through your use of a ‘cold’ wallet. Take your wallet with you in this device which also functions as a mobile phone. Far more natural to carry around with you than bringing another hardware wallet that you need a computer to use!


Again this app adds functionality to the traditional wallet and increases trading speed. The app works by creating a mobile app that serves as a multicurrency digital wallet for Bitcoin, Ethereum, and all ERC20 tokens.

Additionally, Eidoo functions as a hybrid exchange, allowing users to sell, buy, spend and convert cryptocurrencies on one platform.

Once users download the Eidoo mobile app, they can secure all their multi-asset accounts and addresses, as well as their signing keys. Eidoo simplifies and protects wallets by allowing users to access their cryptocurrencies in one place with one password, which is comprised of 12 words.

In case of emergency, Eidoo also offers a “recovery tool” designed to provide users with their tokens in a simple manner.

A very cool app and an interesting one to watch from this Swiss start up.

Reduce the number of wallets you need

Whilst you can increase trading speed and security one of the best tools to use is a multicurrency wallet that reduces the number of wallets you need to hold. You can try these two to start.


Exodus is designed for people who have never used an exchange. It is really simple to use and particularly good for those trading Bitcoin or Ethereum.

Exodus currently supports Bitcoin, Bitcoin Cash, Bitcoin Gold, Dash, Ethereum, Ethereum Classic, Litecoin and unusually Decred.


Very popular Jaxx was first developed in 2014 and serves not only as a Bitcoin wallet but an app which can store multiple cryptocurrencies such as Litecoin, Dash, Ethereum and Bitcoin Cash.

Ripple is not currently supported but the Jaxx team have hinted they may support this feature in the future.


That’s it!

Clearly, there are a huge number of tools out there to help you to manage your Cryptocurrency wallet. Hopefully, this article has given you a good place to start!



Continue Reading
Antivirus, Apple, Chromebook, Enterprise, Internet Security, Microsoft, OS X, Windows

5 Reasons to keep your operating system up to date

Many users have developed the bad habit of delaying or ignoring operating systems updates. They see the little pop up…

Many users have developed the bad habit of delaying or ignoring operating systems updates. They see the little pop up reminders and simply hit “postpone” without a second thought. That is until they experience their first major problem with their shiny new PC or laptop!

Instead of putting off important updates, which we all know inevitably pop up at the least opportune times, users should prioritise them. This is not only to keep yourself secure but also it has benefits relating to your computers performance speed.

So, why is it so important to keep your system updated?


Security vulnerability fixes


The very first reason why new updates constantly appear is to fix security holes. The thing is, no matter how secure an operating system is designed to be, hackers more often than not find ways to exploit systems. Most malicious threats are caused by security flaws that remain unfixed due to a not up-to-date OS.

By ignoring updates, this is the digital equivalent of leaving your doors unlocked and open!


Better Functionality


An OS update will usually provide its users with new and enhanced features. This might also include processing speed improvements. So, the next time you feel your computer isn’t functioning as good as it used to a few weeks back, all you might have to do is wait for an update!

Other functionality features can include improved web browsers or built in security features such as fingerprint ID or face recognition logins.


Bug fixes


All software providers, including your OS provider, carry out meticulous checks before selling their products. However, it is only after some time that faults in the source code starts to appear. That is where updates come into play.

By not updating and having these bugs in play, many bad things can potentially happen on your PC. From software simply not working to an entire OS failure at the extreme end of the spectrum!


Improvement of Hardware performance


OS updates very often bring along driver updates. A driver is a piece of software that allows the operating system to interact with hardware. Depending on the hardware connected to a computer, driver updates might increase the overall performance of your machine, especially when it comes to gaming and connecting to the Wi-Fi.

Although many hardware manufacturers provide driver update capabilities separately, OS providers have improved leaps and bounds in recent years as far as seamlessly providing driver updates is concerned.


Avoiding passing a virus to other computers


While your computer’s operating system might be relatively immune to different malware, it doesn’t necessarily mean it cannot spread to other devices that are on the same network you are on.

For instance, your Macintosh should be quite safe from cyber attacks however you may easily pass a threat to your friends or colleagues who are on a Windows device if you are sharing a common network.

While an update might not be able to completely prevent such a scenario, it definitely can reduce the risks associated with it.

As well as updating your operating system, make sure you have an anti-virus installed to protect yourself. For more information check our article – Top 5 Antivirus programs for 2018


No excuses – Keep your Operating System up to date!


Don’t forget, system updates are designed to protect their users from cyber attacks and provide the best performance. Ignoring them might prove critical to the functioning of your device. If you want to ensure best user experience, there really shouldn’t be an excuse to not keep your operating system up to date!




Continue Reading