tips

BEWARE: Scammers Offering Fake Refunds to Steal Banking Information

Scammers Call Offering Fraudulent Refunds There have been several reports lately regarding people receiving phone calls from individuals claiming to work for their security solution provider.  Not only do they work for your trusted security company, but they’re offering you major refunds!  But don’t get too excited — it’s a scam.  These hackers are calling, asking for

BEWARE: Scammers Offering Fake Refunds to Steal Banking Information Read More »

Computer Virus Software

T-Mobile Notifies 3 Million Customers After Security Breach

Hackers Breach T-Mobile, Leaving Millions Exposed Approximately 3 million T-Mobile customers either have been or soon will be notified their information was involved in a security breach.  Although details are not being released regarding how the attack was executed, T-Mobile has reported approximately 5% of their 75 million users were impacted by a recent data

T-Mobile Notifies 3 Million Customers After Security Breach Read More »

Ransomware Attacks

McAfee, Symantec and Malwarebytes Failed City Office

Multiple Layers of Defense, Doesn’t Always Mean Better Security On January 3, 2018, the ransomware variant, SamSam, infected the city offices of Farmington, New Mexico.  The ransomware infection successfully encrypted multiple areas of the city office including the electronic bill pay and records processing.  Although the infection did not impact utility operations and the city office has made it clear,

McAfee, Symantec and Malwarebytes Failed City Office Read More »

Security lock

Another Significant Security Gap Discovered in Intel Processors

First Spectre and Meltdown, Now Foreshadow Intel has been notified by various researchers that yet another security gap has been found in their processors.  The vulnerability affects its chip security technology called Software Guard Extensions (SGX).  This technology has been used in Intel processors since  2015.  Therefore, if you have an older PC — there is

Another Significant Security Gap Discovered in Intel Processors Read More »

Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting

Must Have Technologies to Thwart Ransomware

Top Tools for Proper Ransomware Defense Ed Tech Magazine recently released three major tools the education sector must have to effectively block ransomware from executing on their systems.  Although Ed Tech was specifically focusing on the educational vertical, these tips can be used in any industry. The three “must haves” include application whitelisting, endpoint protection,

Must Have Technologies to Thwart Ransomware Read More »

Scammers Target Fortnite Users with Android Expansion

Fortnite Users Anxiously Await Android Version – Falling for Scammers in the Process This summer’s “it” game, Fortnite, will soon be expanding its compatibility features to include Android devices.  Although this may be great news for gamers — it may come at a price.  The game’s developers have decided to make downloading available only through

Scammers Target Fortnite Users with Android Expansion Read More »

Alternative Approach to Tackling Vulnerabilities

Security Vulnerabilities Leave End-Users Exposed, But Perhaps There’s Another Way… I recently read an article on software vulnerabilities and the belief these issues will always be present.  This theory makes sense, as society’s dependence on technology and software continues to increase, the likelihood of security gaps existing increases as well.  Although, as long as these

Alternative Approach to Tackling Vulnerabilities Read More »