Security

quote-Thomas-Jefferson-all-tyranny-needs-to-gain-a-foothold-88495
Apple Users Be Warned: CIA Exploits Revealed

Apple users be warned, CIA exploits revealed! Yesterday in a press release WikiLeaks revealed detailed documentation of serveral CIA projects designed to exploit and infect Apple Mac firmware. Most notably the, “NightSkies 1.2” project has been released and is expressly designed to be installed on iPhones before leaving the factory and according to WikiLeaks the CIA has been infecting the iPhone supply chain since 2008. 

499979-ransomware-feature-1.jpg
Ransomware-as-a-Service?

The latest news in the IT security industry is all about Ransomware-as-a-Service (RaaS for short) which is a strain of malware designed to be easy to use, deploy, and infect victims. Ultimately, the goal of these viruses is to collect a ransom in exchange for decrypting the victims files. With RaaS, the host of the malware (where the servers live and are maintained) gets a percentage of the ransom – usually around 5% to 20% – and the remaining cash goes to the RaaS subscriber who actually deployed the virus.

Google_positions.jpg
New Gmail Phishing Scam Is Highly Effective

There is a new Phishing scam that is impacting many Gmail users. This is a highly effective technique used to garner the victims account login information and then use their compromised account to further spread the scam to others in your contact book. There is no sure fire way to verify if your account has been compromised but if you are unsure, change your password immediately. Since there is no programatical way to prevent this sophisticated attack I ask that you spread the word, and share this article around to alert as many people as possible. 

popcorn time.png
Popcorn Time: New Ransomware on the Rise

Just when you thought ransomware couldn????????t possibly get any worse, it has. A new ransomware has popped up called popcorn time. Popcorn time works the same as every other forms of ransomware with a twist. You can pay to have your files decrypted or you can decrypt it for free by infecting two other users. The required payment for this type of ransomware is usually 1 bit coin. Today, this equates to $810. That????????s quite a steep payment for your data and the hackers know this, so they offer you the chance to infect 2 other users. 

1280-yahoo.jpg
Yahoo Hacked: 1 Billion User Accounts Compromised

In the wake of criticism and security concerns over Yahoo’s 2014 breach, the internet giant came forward in a statement yesterday revealing that they had been victims of an aparent hack that impacted over 1 billion user accounts. They go on to state that,

 

For potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.

SantaWiFi.png
Tips to Stay Safe During the Holidays: Avoid ‘Free WiFi’ Traps

With the holidays rolling approaching it is not surprising to see people taking vacation days and running around town but hackers never take the day off. It is especially dangerous around the holiday season when it comes to public WiFi networks. Ensure you stay protected by following these tips to stay safe during the holidays. Be careful connecting to that WiFi network in the mall or airport this season since that network might not be legitimate. With the advent of mobile hotspots hackers are now taking advantage of the popular practice of retail stores providing open WiFi networks to their customers.

UploadsNewsArticle4924141main.jpg
The “Your PC Is Infected” Pop-Up: How to Recognize a Scam

We’ve all seen this pop-up scam at one time or another. We are going to show you how to recognize a scam such as this. These days, with technology everywhere and information at your fingertips it’s much easier for scammers to play upon people’s behavioral patterns. This is the exact purpose of the, “Your PC is infected” pop-up scam where your screen gets frozen and a pop-up tells you that the only way to fix it is to call a phone number for support. This is so successful because people’s natural inclination is to call and get this fixed immediately. Whatever you do – DO NOT CALL THIS PHONE NUMBER! This actually happened to my uncle a while back and he made the mistake of calling the phone number. The fake support technician then installed a remote access tool on his computer after my uncle let him in. Long story short, they stole about $2500.00 from his bank accounts (since he saved his passwords in his browser) and the cost of reloading his workstation. Below is an example of this scam in action:

2d3b24b9dee56aca6647ffed9e166e98.png
Why Every Business Should Have a Domain vs Workgroup Environment

In business computing there are two standards when using Windows: Domain vs Workgroup environments. As a business owner or IT manager, it is critical to understand the benefits and drawbacks of both types of IT environments so that you can make the best possible decision about your company’s IT future. This is especially important when capacity planning, when expanding your workforce, or when planning major IT upgrades to your environment. You can end up spending more time and money in the long run without the correct IT infrastructure in-place.

 

movilidad.jpg
The Business Benefits of a BYOD Solution

If you don????????t know what BYOD is, don’t be concerned because you are not alone. BYOD stands for bring your own device. Many companies face the decision whether to allow employees to bring and use their own personal devices for corporate purposes. There are many benefits of a BYOD solution for your organization beyond enabling your mobile workforce.

1 3 4 5