Technology over the past year has improved drastically and while this is a great thing as it relates to productivity, it has also meant a rise in security breachesand attacks. Unfortunately, it is not looking much better for 2020. According to recent articles, here are three predictions as it relates to Cybersecurity for 2020:… Read more »
Posts Tagged: vulnerability
Have you been caught watching porn?
If you haven’t received an email yet that accuses you of watching porn, it may be arriving soon. A familiar scheme with updated context has been making the rounds lately. The scam involves data from a previous breach which had emails and associated passwords. Assuming the end-user uses passwords across multiple sites, the perpetrator contacts… Read more »
100k People Tricked by Fake IRS Website
A large-scale threat campaign used several fake IRS websites to target over 100,000 people this summer. Researches at cloud security solutions provider Akamai, discovered that the phishing campaign used hundreds of different types of domains and URLS to imitate the Internal Revenue Service of the United States for over two months. Victims of this threat… Read more »
Beware: Windows 10 update email is Actually Ransomeware!
Did you know that Windows 7 will officially be End of Life in less than 2 months? For most companies, this has become common knowledge and unfortunately, this has provided scammers an opportunity to infect your machine with ransomware. According to a report released by a security firm, attackers have educated themselves on the upgrade… Read more »
Disney+ Accounts Hacked and on Sale For $1
Disney’s new demand streaming service has been available for less than two weeks and that is all it took before hackers were able to compromise the streaming service , selling hacked accounts for as little as $1. On November 12th, only hours after the service launched, Disney + users took to social media outraged that… Read more »
Spectre? Meltdown? Should you throw out your computers?
Meltdown and Spectre are the latest named vulnerabilities to appear in the news and they are in fact very problematic because the attacks could be used to read system memory that *should* have been inaccessible. What happens is an attacker could steal sensitive information such as passwords or encryption keys from your computer’s memory. And… Read more »