Intel Facing 32 Lawsuits Due to Meltdown and Spectre Vulnerabilities

Intel in Hot Water – 32 Lawsuits Filed According to Intel’s annual 10-K report filed with the Security Exchange Commission (SEC), the company is facing 30 customer class action lawsuits and two securities class action lawsuits as a direct result of the Meltdown and Spectre vulnerabilities reported last year.  The plaintiffs of the customer suit […]

Continue reading


Crypto-Jacking: The Next Major Cyber Threat

Experts Believe Crypto-Jacking is Next Big Cyber Threat Experts have shifted their emphasis from ransomware to crypto-jacking when considering today’s emerging cyber threats.  Ransomware is a malicious software that encrypts files, then demands a payment to unlock them.  Alternatively, crypto-jacking is the unauthorized use of one’s computer or network to mine for digital currency, or […]

Continue reading


Olympics Opening Ceremonies Impacted by Malware

Malware Takes Systems Offline, Disrupting 2018 Winter Olympics An unknown malware variant infected the Pyeongchang Winter Olympics computer systems.  The infection took place right before the opening ceremonies on February 9, 2018.  It appears the infection was initiated by an insider who knew various pieces of the networking and credentials needed to successfully infiltrate the systems.  […]

Continue reading


Top 9 Malware Variants Targeting the Education Sector

Why Schools Are Targeted When industries think of cyber targets, often times the education sector is not included.  Why?  Well, it is believed they do not carry the financial weight of bigger targets like enterprises or the healthcare industry.  Although, school systems do still hold a plethora of critical data that can be easily exploited.  […]

Continue reading


Texas County Scrambles to Recover $888K Illegitimate Payment

Harris County of Texas Falls for Phishing Scam Hackers are ruthless.  I mean ruthless.  Just weeks after Hurricane Harvey, a hacker sent an email to the Harris County auditor’s office claiming to be a contractor who was due for payment.  The email claimed they were working on restoring damaged parking lots, cleaning up debris, and […]

Continue reading


Hackers Hit “Jackpots” at U.S. ATMs

Hackers Now Emptying U.S. ATMs Hackers targeting ATMs isn’t breaking news.  Historically, these attacks have been seen throughout Asia and Europe.  However, according to Krebs on Security, these attacks are now spreading throughout the U.S.  Earlier this month, the U.S. Secret Service quietly began warning financial institutions that “jackpotting” attacks have now been spotted targeting ATMs […]

Continue reading


Hackers Exploit Meltdown/Spectre Vulnerabilities with Malicious “Patches”

Cyber Criminals Use Processor Vulnerabilities to Spread Malware Once security issues go global, cyber criminals tend to exploit them for their own gain.  It happened with the global ransomware treats, NotPetya, BadRabbit and WannaCry.  Hackers used fraudulent decryption keys to spread malware.  Now, they’re using malicious Meltdown/Spectre “patches” to spread malware.  According to Tech Republic, […]

Continue reading


Meltdown and Spectre FAQs for VARs and MSPs

The vulnerabilities, Meltdown and Spectre, have created a significant security concern around the globe.  Listed below are common questions managed service providers (MSPs) and value-added resellers (VARs) may be facing due to these security gaps. What is Meltdown? Meltdown is a security gap lying deep within the kernel of Intel processors. Meltdown, allows for programs […]

Continue reading


Top Cyber Threats of 2017 & Tips to Stay Safe in 2018

The 2017 Global Threat Intelligence Report (GTIR) broke down the cyber security threats the world faced last year.  Not only will we discuss some key features, but also ways to mitigate each threat. 73% of Malware Attacks were Distributed via Phishing Attacks Emails with malicious intent, or phishing emails, proved to be the method of […]

Continue reading


Security Gaps Found in Billions of Processors

Security Gap Deemed Meltdown Exposed Intel has recently reported a major security gap lying deep within the kernel.  The kernel lies deep within the operating system, and manages operations between the computer and the hardware.  The security gap, deemed Meltdown, allows for programs and applications to communicate with one another through the kernel.  Typically, this […]

Continue reading


North Carolina School District Pays $314k to Restore Systems

Malware Took Out Devices at Three North Carolina Schools Right before school was scheduled to be released for winter break, malware completely took over three of Rockingham County’s school systems.  The virus originated in Bethany Elementary, Western Rockingham Middle School, and the district’s Central Office.  It is believed no other schools were impacted.  However, of […]

Continue reading


Crypto-Mining Malware Spreading Through Facebook Messenger

Crypto-Mining Malware Goes Global Through Messenger With crypto-currency at an all-time high, everyone and their grandmother seems to have found a way to get their hands on it.  Which is exactly why hackers are now creating malware which will mine for the digital currency.  The new malware, deemed Digmine is spreading through Facebook Messenger.  The […]

Continue reading


Kaspersky Files Lawsuit Against Department of Homeland Security

Department of Homeland Security Files Binding Operating Directive 17-01 Leading Kaspersky to Take Action Earlier this month, President Trump signed into law the Binding Operating Directive 17-01  (BOD).  The BOD called for a ban of Kaspersky Labs products on U.S. government devices.  Throughout this year, concerns have risen regarding potential ties between the Russian government and Russian-based security […]

Continue reading


Why Ransomware is Targeting Education Sector

The Education Sector has Major Target on Their Backs… Ransomware has been targeting educational institutions over the last twelve months.  In January of 2017, the Los Angeles Community College District was hit with ransomware, and paid the hackers $28,000 to decrypt their files.  Months later, Dorchester School District Two was infected with ransomware, and paid $2,900 to […]

Continue reading


Security Gap Found in Hundreds of HP Laptops

Security Hole Found in Popular Software Used in Hundreds of HP PCs According to the Business Insider, a security researcher recently found a security vulnerability within the Synaptics software that controls keyboard and trackpad inputs on hundreds HP laptop models. The security gap, is the keylogger function within the Synaptics software.  The technology can be misused […]

Continue reading


86% of Users Deem Data Security More Important Than User Friendliness

User Friendliness or Data Security? PC Pitstop has been conducting a survey on their blog page, TechTalk, regarding what users deem most important – user friendliness or data security.  An overwhelming majority believe security supersedes user friendliness.  According to the survey results, 86% of users believe security is more important.  We all know security should […]

Continue reading


Weekly IT Recap

This week, several breaking news stories hit.  Here are the top five, classified by PC Pitstop. NASA spends $1.4B on information technology – Yes, you read that right.  NASA blew spent 7.6% of their $18.5 billion budget on information security.  They should be good to go, right?! Wrong.  According to ZD Net, they are still […]

Continue reading


Phishing Impacts Victims Far More Than Breaches

Study Reveals Phishing Victims Found to Lose More Than Breach Victims Google conducted a yearlong study regarding the impacts of data breaches compared to phishing scams.  The study found only 7% of individuals whose data was exposed due to a security breach, were still using the same password.  Therefore, although the data was breached, cyber criminals […]

Continue reading


New Bill Proposed to Address Cyber Threats in Medical Industry

In 2017, there have been over 20 medical facilities that were infected with ransomware.  It remains uncertain how many of these facilities paid the ransom demands; however, each and every one of them reported issues with patient care due to the ransomware infection.  These issues range from the inability to access patient records, to turning […]

Continue reading


Alleged #LeakTheAnalyst Hacker Arrested

#LeakTheAnalyst Hacker in Custody BleepingComputer reported, after a 90 day investigation, officials were able to arrest the individual they believe is behind the #LeakTheAnalyst hacker.  The hack, which took place earlier this summer, was targeting Mandiant, a FireEye company.  Although, initial concerns were that Mandiant’s systems were breached, it turns out the hack was actually of […]

Continue reading


“Recommended” Installation Process Often Includes Bloatware

Microsoft Windows

What All Comes with Recommended Installation? How many times have you installed a program and just hit “Next”, “Next”, “Next”?  Often times we assume we are just installing the program we want.  That too often, is not the case.  When installing a program, the default installation process goes to “Recommended” or “Suggested”.  Many users leave […]

Continue reading


44% of Federal Devices Remain Unprotected

It’s Crunch Time to Protect Federal Devices A recent study revealed 44% of federal devices are not properly protected against cyber security threats.  As if this isn’t concerning enough, devices are being interconnected more than ever.  Therefore, these unprotected endpoints can serve as a gateway to infect an entire system or network.  To ensure proper […]

Continue reading