Blog
Library of Congress and US Copyright Office Taken Offline by DDoS Attack
The Library of Congress in the US experienced a distributed denial of service (DDoS) attack, it announced via social media. On July 17th, “the nation’s oldest federal cultural institution” tweeted that its websites were “experiencing technical difficulties”. The...
Cici’s Pizza has a data breach in 130+ Restaurants
Back in early June, we reported that Cici's was investigating a possible data-breach. We can now confirm that this is indeed that case - Cici's Pizza has a data breach. Cici's Pizza, a Coppell TX based restaurant chain, has released a statement about the data-breach....
Apple Fans Get To Patching; One Text Can Steal Your iPhone Passwords
Just about a year ago vulnerabilities in the Android operating system allowed hackers to spy on nearly a billion phones with a specially-crafted text and to do so undetected. Apply iPhone owners should now take note: a respected security researcher has warned that...
ESET Finds Pokemon Go Malware – Analysis
ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started, forcing the user to restart the device. Unfortunately, in many cases a...
Pokemon Go Privacy and Physical Concerns
Pokémon Go has proved incredibly successful in the US and other playing regions. The massive and rapid uptake by consumers of the augmented reality game resulted in its creator Nintendo stock jumped by 70 percent, boosting its market value from £13bn to £19.6bn....
McDonalds to End Streaming of P*rn In Their Restaurants
Enough Is Enough (EIE), an Internet safety organization, praised the McDonald’s corporation® for their decision to filter public Wi-Fi from pornography and child pornography. EIE launched its “National Porn Free Wi-Fi” campaign” in the fall of 2014, with nearly...
Were you planning on downloading the Pokémon GO APK? Beware fake versions!
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, the augmented reality game that will allow players to catch hidden Pokémon’s in the real world and conquer “gyms” through the internet, traveling both physically as...
FDIC accused of being hacked and covering it up!
Multiple news agencies are reporting (quietly we think) that the Federal Deposit Insurance Corporation (FDIC) was hacked between 2010 and 2013 - and that the US Government tried to cover it up! WASHINGTON (Reuters) - The Chinese government likely hacked computers at...
CYBERCRIME ALERT: Don’t be a money mule
You know the old saying: "If it sounds too good to be try, it probably is!" - that always holds true for a class of money laundering crimes which could turn you into a "Money Mule"! Read more to help protect you and your loved ones from fraudulent schemes where...
PATCH DAY: Adobe, Microsoft Patch Critical Security Bugs
PATCH DAY: Both Adobe and Microsoft Patches are Critical Today This month's big patch day brings 'critical' updates from both Adobe and Microsoft. Adobe Patches Flash and Reader Adobe pushed out a critical update to plug 52+ bug in Flash Player an update to patch in...
Avast! acquires AVG in a deal worth $1.3bn
In their blog, Avast! has laid out their vision of what the two joined companies will be together. buys Avast! Blog Post: Forward-Looking Statements This communication contains forward-looking information that involves substantial risks and uncertainties that could...
A small business security plan – part 2
In the 2nd part of our article, "What does a real world small business security plan look like?" we have finally got into the office where your PCs, macs and perhaps servers are are located. But before we start getting into solutions you need to buy, we must again...
Could Your Business Survive a Cryptor
The days of simple malware - developed by amateurs that were just looking to make mischief - are long gone. Organized crime lies behind much of today's malware...and the focus is on making money. It’s possible that you or someone in your company will get held to...
Wendy’s releases list of more than 1,000 restaurants hit in data breach
Back in January we reported that Wendy's was investigating a possible breach - that was confirmed in June of this year when Wendy's admitted that they had a breach which was larger than originally thought. Now we have the list of 1,000+ restaurants which were affected...
BBB Warning: Summer Festival Goers Beware!
The Better Business Bureau (BBB) is warning summer festival goers to be on the lookout for festival scams... This summer, don't fall for a festival scam. Scammers are tempting would-be festival goers into buying tickets for events promising all-you-can-eat crabs, live...
What does a real world small business security plan look like?
So you run a small business and you have a nagging feeling that you don't have an adequate business security plan in place - you know this - your staff know this and it's been worrying you, but you put it off because the task is daunting and it simply isn't your...
Password Strength: It’s not about special characters!
Did you see our most recent Computer Security Solution blog post? Many of us use dozens (or hundreds) of online websites that need a password. Traditionally, experts have offered two pieces of advice about passwords: first, strong passwords are those with random...
Password Strength: It’s not about special characters!
Many of us use dozens (or hundreds) of online websites that need a password. Traditionally, experts have offered two pieces of advice about passwords: first, strong passwords are those with random characters and second, avoid using the same password for different...
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.
"*" indicates required fields