Uncategorized

Home/Uncategorized

Twitter Based Botnet can Hijack Your Phone

A new strain of malware has been discovered that changes the rules of how most people think about botnets.  The apply named Twittoor, is a Trojan that that infects Android phones and uses the Twitter social network to coordinate the botnet.  Twitoor is believed to be the first instance of a botnet controlled through a [...]

By |2019-02-04T02:35:49+00:00August 26th, 2016|Botnet, malware, Uncategorized|Comments Off on Twitter Based Botnet can Hijack Your Phone

Why your network might be vulnerable

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Mauris sodales molestie metus, non elementum ex laoreet at. Sed at tempus elit.   Cras at sodales tortor. Ut ac nisl odio. Donec arcu purus, dictum ac justo nec, interdum scelerisque diam. Ut lacinia mi quis ipsum volutpat aliquet. Aliquam vitae varius ex, vel condimentum dui. Phasellus [...]

By |2019-02-04T02:35:49+00:00August 23rd, 2016|Technology, Uncategorized|Comments Off on Why your network might be vulnerable

The Business of Unwanted Software

If you’ve ever downloaded a piece of software, there is a good chance you have encountered pack-in or pay-per-install software.  As it turns out, pay-per-install software is a highly lucrative market that walks a thin line of legality and is often more aggressive and equally as disruptive as malware. Researchers at Google conducted a yearlong [...]

By |2019-02-04T02:35:49+00:00August 12th, 2016|System Security, Uncategorized|Comments Off on The Business of Unwanted Software

Flaws in HTTP/2 Could Bring Down Web Servers

The HTTP/2 protocol for websites was officially launched in May of last year as a way of improving website performance.  The new protocol was quickly adopted and supported by all major browsers, but unfortunately, it looks like a few flaws exist in the system. Cybersecurity firm Imperva released research into a number of high-profile flaws [...]

By |2019-02-04T02:35:50+00:00August 5th, 2016|System Security, Uncategorized|Comments Off on Flaws in HTTP/2 Could Bring Down Web Servers

Apple iOS Devices Vulnerable to Image Based Malware

Cisco researchers have discovered vulnerability in the way that Mac devices process image formats.  TIFF image files are data rich and typically used by publishers or designers, unfortunately, these images can contain more than just image data.  Because of how Apple processes image data, TIFF files can be used to run malware automatically, without being [...]

By |2019-02-04T02:35:51+00:00July 22nd, 2016|malware, System Security, Uncategorized|Comments Off on Apple iOS Devices Vulnerable to Image Based Malware

Ransomware: Best Case Scenario

Proactive defenses and employee education are the best ways to protect against ransomware, however, accidents happen and sometimes malware sneaks through even the best defenses.  We’ve discussed ransomware disasters in the past but you may wonder how things would turn out with proactive solution in place.  Quite recently, our technicians remediated just such an occurrence. [...]

By |2019-02-04T02:35:51+00:00July 15th, 2016|Ransomware, System Security, Uncategorized|Comments Off on Ransomware: Best Case Scenario

Severe Security Loophole Discovered in 25 Symantec/Norton Products

Individuals and businesses alike turn to Symantec for system security but a recently discovered exploit reveals that some versions of the software may do more harm than good.  Tuesday, researchers discovered a bug that affects the majority of the Symantec product line and exposes millions of users to the threat of automatically propagating attacks. The [...]

By |2019-02-04T02:35:51+00:00June 30th, 2016|System Security, Uncategorized|Comments Off on Severe Security Loophole Discovered in 25 Symantec/Norton Products

Don’t Wait For a Disaster to Upgrade Your Operating System

There was a time when operating system upgrades were only pursued as the result of system failure.  Dead hard drive?  Might as well install a new OS on the new one.  Need to replace your whole computer?  It’s going to come with a new OS.  The problem is that this break-fix mentality has no place [...]

By |2019-02-04T02:35:51+00:00June 13th, 2016|Uncategorized, Windows 10|Comments Off on Don’t Wait For a Disaster to Upgrade Your Operating System

The Dangers of Shared Passwords

The recent credential leak from LinkedIn revealed that a large percentage of users continue to use common or weak passwords.  While many people may not consider LinkedIn security a top priority on its own a more troubling statistic was discovered. Nearly a third of the leaked accounts on LinkedIn used the same password/username combination on [...]

By |2019-02-04T02:35:51+00:00June 1st, 2016|System Security, Uncategorized|Comments Off on The Dangers of Shared Passwords

Hacked LinkedIn Credentials Selling on the Dark Web

Back in 2012, LinkedIn admitted that their social network had seen a breach that led to millions of compromised accounts.  At the time, it was believed that the breach was limited to around 6.5 million leaked passwords, but recent events has put that number at over 117 million.  While alarming on its own, the four [...]

By |2019-02-04T02:35:51+00:00May 20th, 2016|System Security, Uncategorized|Comments Off on Hacked LinkedIn Credentials Selling on the Dark Web