Top 10 Tricks Cyber Ghouls Hope You Fall For

Hackers Offer No Treats, Only Tricks… As we inch closer and closer to the holiday season, hackers are becoming more and more aware of ways to exploit users.  Below are the top 10 ways cyber criminals are capitalizing on user behavior: Unsecured WiFi connections, what’s the harm? By using public WiFi, or any other form […]

8,528 total views, 2 views today

Continue reading


Avoid Intruders By Simply Locking Your Doors….

Going back to the basics… The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use three different products that all do the same thing, which in turn interferes with each one’s functionality. So, PC Matic wants to go […]

4,195 total views, 10 views today

Continue reading


Pentagon’s Defense Department Suffers Security Breach

Defense Department Breached, Leaving 30K Employee’s Information Exposed Last week, the Pentagon confirmed its Defense Department was breached, impacting approximately 30,000 military and civilian employees.  The information breached included personal information and credit card data.  At this time, there is no evidence any classified information was compromised. Although the Pentagon just confirmed this breach, department […]

2,588 total views, 1 views today

Continue reading


New York County’s Government Breached After RDP Attack

Otsego County government, located in New York, suffered a security breach when hackers infiltrated systems by exploiting remote desktop servers According to GovTech, international hackers used a remote desktop server, located in an employee’s home, to access the county’s networks.  From there, hackers utilized all of the county’s resources to mine for crypto-currency, also known […]

4,872 total views, 2 views today

Continue reading


Minnesota Department of Human Services Suffers Breach

21K Minnesota Citizen’s Exposed in Government Breach Within the last week, the Minnesota Department of Human Services confirmed falling victim to a security breach.  The breach was executed when two department employees clicked on a malicious email.  The origin of the phishing email remains unclear. As a result of the breach, approximately 21,000 individuals who interacted with […]

1,599 total views, no views today

Continue reading


Sextortion Scams Are Sending Users Into a Frenzy

Advancements to Sextortion Scams Continue Hackers continue to trick users into thinking their computers have been infected with malware that recorded videos of them watching porn.  In an attempt to legitimize their claims, the hackers reveal they know a real password the victim has used and have begun spoofing victims’ email addresses.  By spoofing the email […]

41,327 total views, no views today

Continue reading


Symantec, Makers of Norton, Faces Claims They Aren’t as “Industry Leading” as They Report

Symantec Claims to be Industry Leading — But Are They Really? According to a federal ruling, Symantec Corporation will have to continue defending against class claims that its Norton and Enterprise products failed to protect its users against the latest online cyber threats. Edward Chen of the U.S District Court ruled Symantec’s statement that its […]

10,702 total views, 2 views today

Continue reading


Breaches Increase, Yet Households Are Less Worried About Identity Theft?

Security Breaches Rise, Yet Households Report Less Concern? According to Javelin Strategy and Research, identity theft has risen for four consecutive years.  Yet, in the 2017 survey from the Commerce Department’s National Telecommunications and Information Administration (NTIA), only 57% of households reported concerns regarding data breaches, compared to 63% in 2015. Now, this would make sense […]

2,254 total views, 1 views today

Continue reading


Romanian Hackers Arrested for D.C. Police Camera Hack

Two Romanian Hackers Face Charges for D.C. Camera Hack A mere days before the 2017 Presidential Innaugeration, Washington D.C.’s police cameras were inaccessible due to ransomware that infected approximately 126 computers connected to the camera’s networks.  After infecting the systems, hackers demanded over $60,000 to restore the systems.  However, the IT department worked quickly, taking […]

2,257 total views, 7 views today

Continue reading


Is This Windows File Hoarding Your Personal Information?

Microsoft Windows

Windows WaitList.dat File Has Been Found Storing User Data Now, before anyone panics, there are two major things you must understand.  First, this is only impacting Windows PCs with touchscreen capabilities.  In addition, a user of this PC must have enabled the handwriting recognition feature.  This feature generated formatted text from a person’s writings they […]

3,024 total views, 5 views today

Continue reading


Flood of Cyber Attacks Drives Endusers to New Antivirus Solutions

Ransomware Attacks Drive 44.53% of Endusers to Reconsider Their Antivirus Solutions Not only are ransomware attacks taking place daily, but news coverage of these attacks has increased.  Therefore, the public has become more aware of this cyber threat.  The same can be said for another cyber threat, crypto-jacking.  Not long ago, computer users would have […]

5,697 total views, 23 views today

Continue reading


Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software

Everything isn’t always what we seem.  This is something we have come to know and accept.  However, when we download a program that is supposed to protect us, that is what we expect it to do.  Apple users were recently duped with Adware Doctor, which positioned itself as an adware prevention tool, but actually was […]

5,927 total views, 3 views today

Continue reading


Microsoft Macros Listed as Primary Malware Distribution Tactic

Hackers Use Microsoft Macros to Distribute Malware Tech Republic has determined in the month of August, approximately 45% of malicious activity monitored was executed through Microsoft’s macros feature.  This means that the malware was hidden in a Microsoft program and upon opening, the malware would execute assuming macros were enabled.  Often times Microsoft’s macro feature is […]

2,315 total views, 4 views today

Continue reading


Ransom Payments or Downtime – Which is Worse for SMBs?

Which Creates More Issues for SMBs? Asking questions like this is simply asking, which is the lesser of these two evils?  Neither is wanted or preferred.  And both cause substantial damage.  So forgive my bluntness, but which sucks less? Reports have suggested downtime is more damaging, financially than paying the ransom demand.  This is contingent upon several […]

1,645 total views, 3 views today

Continue reading


Hawaii Issues Breach Warning After Ransomware Infection

Hawaii Medical Facility Issues Warning to 40k Patients The Fetal Diagnostic Institute of the Pacific (FDIP), located in Honolulu, Hawaii has begun contacting over 40,000 patients regarding a potential data breach.  Concerns of a breach come after the facility fell victim to a ransomware attack in June of this year. After discovering the ransomware, FDIP contacted […]

1,267 total views, no views today

Continue reading


RDP Attacks – What they are and how you can stay protected

What is an RDP Attack? RDP, or Remote Desktop Protocol, is a port on devices that allow for remote access to be gained by anyone who has the appropriate credentials.  An RDP attack means an unauthorized person or entity is accessing the network through the device’s RDP ports.  The attack may be an actual person […]

2,511 total views, no views today

Continue reading


Targeted Attacks or Untargeted Attacks – Which is Most Common?

Targeted and Untargeted Cyber Attacks Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two. First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.  Instead, they simply cast as wide of a net as possible, and send out the […]

2,414 total views, no views today

Continue reading


An Antivirus Protection That Never Quits

Antivirus Protection that Never Quits — What Every Customer in the World Needs Cyber security threats are evolving every single day.  As customers of antivirus solutions, you need to demand better products.  You need to demand an antivirus protection that never quits.  But what would that look like? Consistent Innovation First, is the need for […]

2,534 total views, no views today

Continue reading


Fun Fact – You Can Use PowerPoint to Record Your Screen

Microsoft Windows

Recording Your Computer Screen With PowerPoint It likely isn’t a regular occurrence that you wish to record something on your computer screen.  However, if the need is ever present, it is nice to know it can be done without installing yet another third-party application. How To Do It You will need to have open whatever […]

3,060 total views, 6 views today

Continue reading


Hackers Target Specifically Based on This One Thing

How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.  There it is.  That is the big secret, which likely isn’t as shocking as one anticipated.  Why do hackers target vulnerable systems?  This too is rather simple.  They don’t want to […]

7,214 total views, no views today

Continue reading


BEWARE: Scammers Offering Fake Refunds to Steal Banking Information

Scammers Call Offering Fraudulent Refunds There have been several reports lately regarding people receiving phone calls from individuals claiming to work for their security solution provider.  Not only do they work for your trusted security company, but they’re offering you major refunds!  But don’t get too excited — it’s a scam.  These hackers are calling, asking for […]

4,456 total views, 1 views today

Continue reading


How Hackers Know If They’ve Hit a Gold Mine

Top Information Hackers Look For There are two types of cyber attacks, targeted and untargeted.  Targeted could be as specific as going after a certain business or government agency, or as broad as a certain sector such as education or healthcare.  Targeted attacks often occur when an enemy or competitor specifically targets a business or […]

4,362 total views, no views today

Continue reading


T-Mobile Notifies 3 Million Customers After Security Breach

Hackers Breach T-Mobile, Leaving Millions Exposed Approximately 3 million T-Mobile customers either have been or soon will be notified their information was involved in a security breach.  Although details are not being released regarding how the attack was executed, T-Mobile has reported approximately 5% of their 75 million users were impacted by a recent data […]

5,937 total views, no views today

Continue reading


Must Have Technologies to Thwart Ransomware

Top Tools for Proper Ransomware Defense Ed Tech Magazine recently released three major tools the education sector must have to effectively block ransomware from executing on their systems.  Although Ed Tech was specifically focusing on the educational vertical, these tips can be used in any industry. The three “must haves” include application whitelisting, endpoint protection, […]

2,070 total views, no views today

Continue reading


Scammers Target Fortnite Users with Android Expansion

Fortnite Users Anxiously Await Android Version – Falling for Scammers in the Process This summer’s “it” game, Fortnite, will soon be expanding its compatibility features to include Android devices.  Although this may be great news for gamers — it may come at a price.  The game’s developers have decided to make downloading available only through […]

3,821 total views, 1 views today

Continue reading