Legacy Operating Systems Including XP Lose Chrome Support

Legacy Operating Systems Including XP Lose Chrome Support

If your company has one or more of millions of PCs still running Windows XP, your options are collapsing around you rather quickly, making it more important than ever to finally get around to upgrading to a more current OS. Microsoft formally ended all support for XP last year, and now Google has decided to […]

read more
Using Oracle Software? Update Now

Using Oracle Software? Update Now

It’s been a busy week at Oracle. The company has recently released a massive flurry of patches that fix a staggering 136 security issues for a wide range of the products it sells. This release comes in tandem with the decision to switch from CVSS 2.0 to CVSS 3.0 (the Common Vulnerability Scoring System). The […]

read more
Microsoft Releases Optional Update to Secure Wireless Mouse From Threat

Microsoft Releases Optional Update to Secure Wireless Mouse From Threat

Last year, an IoT (Internet of Things) security firm called Bastille Networks uncovered an attack from an unexpected vector. Hackers can actually take control of your wireless mouse, which has no on-board security, and use the device to spoof keyboard inputs to the computer it is attached to. The hope was that by revealing details […]

read more
Have You Enabled Two Factor Authentication Yet?

Have You Enabled Two Factor Authentication Yet?

Are you still using single factor authentication in your business? If so, you are taking an unnecessary risk. If the only thing standing between the hacking community and your company’s data is a password, then no matter how robust those passwords might be, it’s just a matter of time before someone slips up, and your […]

read more
Even Large Company Employees Get Hit By Phishing/Whaling Scams

Even Large Company Employees Get Hit By Phishing/Whaling Scams

Toy manufacturing giant Mattel was recently the target of a whaling scam that could have been both highly embarrassing and extremely costly, if not for a single stroke of luck. If you’ve not heard the term, “whaling” is a subset of the phishing scams that hackers commonly run, with the key distinction being that whaling […]

read more
Mistypying A Web Address Could Put Malware On Your System

Mistypying A Web Address Could Put Malware On Your System

More problems for the Adobe Flash player, and a new type of hacking attack that security experts are referring to as “Typosquatting.” If you’ve not yet heard the term, you’re not alone, but you can bet that it will be making headlines in the months ahead. So far, this type of attack is limited to […]

read more
Urgent News: US Government Urges Removal of QuickTime for Windows

Urgent News: US Government Urges Removal of QuickTime for Windows

If you have Apple QuickTime installed on a Windows-based PC, you should uninstall it immediately. In a public statement issued on 4/14/2016, the US-CERT recommends the removal of QuickTime for Windows. Apple announced that they’re no longer supporting the product in any way, including issuing security updates. On the heels of this announcement, the Zero […]

read more
Are You Sharing Your Passwords?

Are You Sharing Your Passwords?

The statistics are both shocking and dismaying. Even in the face of innumerable high profile data breaches, people still aren’t serious about personal data security. In fact, a shocking 95% of people admit to sharing between one and six passwords with friends. Most of these seem innocuous. After all, it’s not too much of a […]

read more
Ransomware Continues to Evolve

Ransomware Continues to Evolve

“What’s old is new again.” The simple truth is that tastes and trends seem to repeat. We’ve seen it countless times in the world of fashion, and now, we’re seeing something similar in the hacking community. Over the past year or so, hackers around the world have come to rely increasingly on a type of […]

read more
Your Server May Be Open To Ransomware Exploits

Your Server May Be Open To Ransomware Exploits

The hacking community seems to have found another viable business model, this time, in the form of ransomware. Given the success that hackers have been finding with this type of attack lately, they’ve upped their game, and have begun to experiment with and vary their approach when getting ransomware onto target machines. Samsam, a variant […]

read more
“Better History” Google Chrome Extension Might Be Redirecting Your Browser

“Better History” Google Chrome Extension Might Be Redirecting Your Browser

If you use Google Chrome, you might have the “Better History” extension installed. If you do, and you’ve upgraded it recently, you’ve probably seen a large influx of advertising on your screen. Yes, you guessed it, hackers have found yet another avenue of attack, this time, co-opting browser extensions. In this particular case, the browser […]

read more
Stayed at a Trump Hotel? Your Information May Be at Risk

Stayed at a Trump Hotel? Your Information May Be at Risk

You’ve probably heard that last year, Trump Hotels were successfully breached, and an unknown number of customer credit cards compromised. In fact, what makes last year’s breach of Trump Hotels remarkable as compared to the breaches of a number of other hotel chains last year is the almost complete lack of information about the incident. […]

read more