IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
July 14th, 2018 | Jay Ferron
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Here a new one that has started to circulate.__________________________________________ - read more
 
Blog Entry
 
Blog Entry
July 14th, 2018 | Jay Ferron
The Chinese cybersecurity research team known as Keen Security Lab has disclosed 14 security vulnerabilities affecting a range of BMW vehicles. Eight of the flaws affect the infotainment system, four affect the Telematics Control Unit (TCU), and two affect the Central Gateway Module (CGM). The TCU handles remote communication in the vehicle, such as the ability to unlock the doors remotely. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
MuddyWater malware is believed to be once again targeting organizations across the world.  This malware was first reported when it targeted the Saudi government back in 2017 andwas reported to have also targeted other organizations in the US, Turkey, and other Middle Eastern countries. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
It was announced that European researchers discovered that the popular PGP and S/MIME email encryption standards are vulnerable to being hacked. Dubbed EFAIL, it is described as vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME. From the website, EFAIL abuses active content of HTML emails to exfiltrate plaintext through requested URLs. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
It was a busy end of May for cybersecurity in our nation’s capital. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
Red Hat Enterprise Linux (RHEL) is a popular distribution used by many organizations for servers and other network endpoints. Two free versions of the operating system have also branched out of RHEL, Fedora and CentOS. US-CERT issued an alert Wednesday that a critical vulnerability had been discovered in the Network Manager application and how it handles Dynamic Host Configuration Protocol (DHCP) responses. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
Since 2012, the Necurs botnet has been an evolving work horse of a botnet, backing up the Jaff ransomware, Dridex banking Trojan, and Locky ransomware campaigns. Most recently it has been found pushing URL files with misleading icons to trick victims into exposing themselves to the malware of the attacker’s choice. It eludes some spam filters by contacting the command and control server instead of directly downloading the malware. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
The personal data of 21 million Timehop customers has been compromised as hackers were able to breach their backend server environment. Timehop functions by connecting to social media platforms to show users’ past memories. The breach was disclosed on Sunday, July 8th, stating that the breach occurred on the week of July 4th. - read more
 

Pages

Subscribe to Tips and Advice