877-886-6332 [email protected]
  • Contact Us
  • Hosting Login
  • Remote Support
  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
  • RSS
Computer Security Solutions
  • About Us
  • Get Help With
    • Backup & Disaster Recovery
    • Cyber Security
    • Domain Registration
    • Email Security
    • Managed IT Services
    • Staff Education & Testing
    • Working Remotely
  • Small Business Solutions
    • Cyber Security & SMBs (Free Download)
    • Cyber Security & Cloud Computing (Free Download)
  • Become a Reseller
  • Blog
Select Page

Leaked Source Gone: a Good or a Bad thing? Some thoughts on Leaked Source

Mar 29, 2017 | Data Breaches

In what appears to be the result of an FBI raid, the website ‘LeakedSource.com’ has been taken down as of about mid-January. It was a site we and other professionals referred to in order to find email addresses which might have been compromised.

16 years of Mac OS-X: Secure but not invincible to malware

16 years of Mac OS-X: Secure but not invincible to malware

Mar 26, 2017 | General Security, Malware and Exploits

The various Mac OS-X malware cases we’ve seen over the last few years prove that no matter which operating system a user chooses, the concept of 100% security simply doesn’t exist – and that also Mac is of growing interest to malware writers.

Nest Cam, DropCam and DropCam Pro Wireless Cameras are Vulnerable!

Nest Cam, DropCam and DropCam Pro Wireless Cameras are Vulnerable!

Mar 26, 2017 | CyberSecurity

Security researcher Jason Doyle has discovered another flaw in connected devices, this time in Google’s Nest Cam, Dropcam and Dropcam Pro. These could be exploited by a burglar close to your house – anywhere within Bluetooth range – rather than being compromised...
Google Warns Many as More Websites Fall Victim to Hackers & Cybercriminals

Google Warns Many as More Websites Fall Victim to Hackers & Cybercriminals

Mar 23, 2017 | Cyber-Crime, CyberSecurity, Data Breaches, Malware and Exploits

The total number of websites compromised by cybercriminals during 2016 was 32% higher than in the previous year, according a report: “Websites Fall Victim” issued by Google. The tech leader added that this spiral of cyberattacks is unlikely to lose...
Supply-Chain Android Malware Infection is a VERY big deal

Supply-Chain Android Malware Infection is a VERY big deal

Mar 17, 2017 | Malware and Exploits, Mobile Security

Supply chain corruption is here – Android devices infected with malware prior to being bought by an end-user are a fact. This isn’t the first time that this is happened, not by a long way.

« Older Entries
Next Entries »

Recent Posts

  • Ransomware: What Every Business Owner Needs to Know (And Do) to Stay Safe June 9, 2025
  • Why Monthly ESET Protection is the Best Choice for Small Businesses June 2, 2025
  • Cyber Scammers Are Targeting Small Businesses and Home Users — Here’s How to Protect Yourself May 27, 2025
  • Understanding Your Cybersecurity Exposure Points for Small Businesses and the Benefits of Managed IT Services March 10, 2025
  • Getting Remote Support October 27, 2024

Computer Security Solutions

  • Home
  • About Us
  • Contact Us
  • Remote Support
  • Become a Reseller
  • Blog
  • Terms | Privacy | Legal

Get Help With

  • Cyber Security
  • Backup & Disaster Recovery
  • Email Security
  • Hosting Login
  • Managed Services
  • Solutions for Small Businesses
  • Staff Education & Testing

Contact Us

Support / Helpdesk
Get a Trial or Quote

877-886-6332
[email protected]

  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
  • RSS
  • Partner with us
  • Managed Services
  • Security News You Can Use
  • Remote Support