Hackers Put a New Spin on Tax Scams

Tax Evasion Scam Spreads, and Hackers Want Paid — or Else… Extortion emails have increased in popularity lately, starting with the massive sextortion campaign that began earlier this year.  Now, a new extortion scam is underway that claims the victim’s computer was hacked.  Then, upon being hacked, it was determined taxes were being hidden from the […]

351 total views, 15 views today

Continue reading


Hackers Capitalize on Tax Season with Spread of Banking Trojan

Banking Trojan TrickBot Spreads Like Wildfire For years, cyber criminals have increased spam campaigns around tax time, in an attempt to make a quick buck.  This year is no different.  Cyber criminals have begun distributing the banking Trojan, TrickBot, through malicious emails fraudulently portraying tax and payroll services.  Researchers confirmed the malware has been used […]

3,956 total views, 66 views today

Continue reading


Responding to the Computer Skeptic

PC Matic Shield

It has been brought to PC Pitstop’s attention, the Courier Journal published an opinion piece regarding PC Matic – written by self-proclaimed “computer techie”, Jim Fisher. Unfortunately, the article was littered with misinformation about PC Pitstop, PC Matic and even personal attacks against the company’s CEO, Rob Cheng. Moreover, there is no indication that Mr. […]

5,092 total views, 2 views today

Continue reading


A Major Message of RSA

According to one of the world’s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks. This sounds rather dismal. Yet, depending on the security approach being deployed, it may be entirely accurate. In order to effectively stop future cyber attacks, there are proactive approaches businesses of all shapes and […]

1,214 total views, 1 views today

Continue reading


Google Advises Windows 7 Users to Update Their Systems ASAP

Chrome Users Exposed to Two Zero-Day Attacks, One of Which Remains Unresolved for Windows 7 Users It should be no secret that Microsoft will be ending their support for the Windows 7 operating system in January of 2020. However, due to the recent exploitation of two zero-day vulnerabilities within the Chrome browser, one of which […]

1,138 total views, no views today

Continue reading


Top 5 Reasons Your Employees Struggle with Cyber Security

They say you’re only as strong as your weakest link. This couldn’t be any more accurate when it comes to the strength of an organization’s cyber security. Even if there are knowledgeable IT professionals within the organization, and most employees are trained in cyber security risks — it only takes one. One person to click […]

1,754 total views, 1 views today

Continue reading


19 Year Old WinRAR Vulnerability Exploited Around the Globe

WinRAR, a popular file utility tool, has been found to have a 19 year-old vulnerability. Fortunately, WinRAR developers were able to remediate the problem shortly after the information went public. However, that’s not to say the issue has been entirely resolved. In order to receive the patch, users must update the software program. If users […]

4,750 total views, 1 views today

Continue reading


Tennessee College Network Corrupted After Malware Attack

College Networks and Devices Remain Inaccessible After Emotet Malware Riddles Systems Classes have resumed this week after malware corrupted a Tennesee college network and devices last week. Columbia State Community College initially was infected with Emotet malware on February 13th when an employee opened an infected email. Initial thoughts were the malware was successfully contained. […]

838 total views, 2 views today

Continue reading


Hackers Threaten to Detonate Bombs if Victims Don’t Pay Up

Pay Bitcoin Demands Or Else… Hackers have taken malicious scams to an entirely new level by sending a wave of threatening emails to businesses, schools, and public municipalities in the U.S., Canada, and the U.K.  The hacker’s ransom note demands a payment of $20,000 in bitcoin by the end of the day.  They also claim, if the […]

2,160 total views, 2 views today

Continue reading


Scammers Exploit 11 Year-Old Firefox Vulnerability

Firefox Leaves Security Gap Open for Hackers… One of the top used browsers, Firefox, has left a security gap open which hackers and scammers continue to exploit.  These cyber criminals are embedding an iframe into various malicious website’s source code, which can be exploited on each browser (Chrome, Edge, or Firefox).  However, it is how the […]

10,824 total views, 3 views today

Continue reading


Police Shut Down 16 Fake Virus Scam Call Centers

Indian Call Centers Raided for Fake Virus Scam Last week, 16 fake virus scam call centers in Gurgaon and Noida, India were raided.  This led to the arrest of 39 people for allegedly impersonating technical support representatives for companies like Microsoft, Apple, Dell and HP.  In the raid, police officers found various pieces of evidence […]

4,844 total views, no views today

Continue reading


Security Breach Leaves 12K Patient Files Exposed

Major Security Breach Leaves Thousands of Patients Exposed Inova Health Systems, a non-profit health organization based in Falls Church, Virginia, was hit with a security breach in September 2018.  This breach potentially impacted over 12,000 patients in six different medical facilities. The parent company, Valley Health, has sent letters to potentially impacted patients. How Did It Happen? […]

997 total views, 1 views today

Continue reading


Another Facebook-Owned Company Suffers Security Breach

Security Gap Found in Facebook-Owned Company Instagram, a social media company owned by Facebook, recently implemented a tool in their platform allowing users to download a copy of all the data Instagram has stored in their account, including pictures, account profile information, and comments.  This feature was deployed in an attempt to accommodate the upcoming […]

1,016 total views, 1 views today

Continue reading


Cyber Criminals Use Browser Extensions to Spread Malware

As if there aren’t enough ways for users to stumble upon malware, hackers are now taking an aggressive approach with browser extensions. Users are known for downloading various browser extensions to increase the use and efficiency of their browsers.  However, as browser extensions become more popular, it increases the odds malicious ones will worm their […]

4,122 total views, no views today

Continue reading