Blog
Critical fixes for Windows, Flash and Java
Window, Flash and Java Updates![/caption]Windows users and those with Adobe Flash Player and/or Java installed, it's time to update again! Microsoft just released 13 updates to address more than three dozen unique security vulnerabilities. Adobe issued security fixes...
Java 8 Update 71
Last week Oracle shipped an update for its Java software (Java 8 Update 71) that fixes at least 8 critical security holes. If you have an valid use for Java, update to the latest version; if you’re not sure why you have Java installed, it’s probably time to remove the...
Police Warn of Facebook (and other Social Media) Timebomb
Facebook and other Social Media sites setup 'age limits' when they opened themselves up for public use - however, many young children simply lied about their age and joined up to use the popular social media sites. This means, that when they opened for business some...
SSL Vulnerability: High-severity bug in OpenSSL means attackers can decrypt HTTPS
The maintainers of the OpenSSL cryptographic code library have fixed a high-severity SSL vulnerability that made it possible (under certain circumstances) for attackers to obtain the key that decrypts communications secured in HTTPS and other transport layer security...
Bayrob: ‘Application Not Compatible’ – Stealing Your Information
In recent months, ESET has analyzed several threats that have been detected in high volumes, higher than usual in many countries such as Germany and Spain. Perhaps the most interesting case analyzed recently concerns the Nemucod malware, which was spreading Teslacrypt...
Ransomware Authors increasingly targeting Businesses
Cybercriminals are increasingly targeting businesses with ransomware, according to a new report. The Online Trust Alliance (OTA)’s 2016 Data Protection and Breach Readiness Guide found that there has been a surge in this type of attack. Ransom demands have also become...
Ring Doorbell: IoT Security Failure
Here’s the physical security that the Wi-Fi enabled, Internet of Things Ring smart doorbell gives you: 1) automatic activation and notification on your mobile phone when people come close to your home or loiter around it, and 2) a CCTV camera and high-quality intercom...
Wendy’s Investigates Possible Credit Card Breach
In a report today in KrebsOnSecurity.com, we have learned that fast food chain Wendy's Restaurants is investigating the possibility of a credit card breach. According to the respected security blogger, Brian Krebs, the investigation stems from inquiries made by Krebs...
Java 8 Update 71 Fixes at Least 8 Critical Security Holes
Last week Oracle shipped an update for its Java software (Java 8 Update 71) that fixes at least 8 critical security holes. If you have an valid use for Java, update to the latest version; if you’re not sure why you have Java installed, it’s probably time to remove the...
Hyatt Card Breach Hits 250 Hotels in 50 Nations
Have you stayed, eaten or relaxed at a Hyatt hotel or property between Aug. 13 2015 and Dec. 8, 2015? If so, there is a very good chance that your credit or debit card data was stolen by unknown cyber thieves who infiltrated many of the hotel chain's payment systems....
WordPress 4.4.1 – Critical Security Release
Today WordPress released a CRITICAL SECURITY update in the form of WordPress 4.4.1. All customers are recommended to apply this fix as quickly as possible. WordPress 4.4.1 is now available. This is a security release for all previous versions and we strongly encourage...
Hilton Wordwide Credit Card Breach Announcement
Hilton Credit Card Breach: Hilton Worldwide announced that it had discovered and removed malware designed to steal payment card information from restaurants, gift shops and other point-of-sale systems at some of its hotel properties. So, if you've stayed at one of...
Retailers targeted by sophisticated ModPOS malware
CSO Online is reporting that the ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely to be more infections still out there since this particular malware is...
Ensuring BYOD isn’t “bring your own destruction”
In a recent article in Health Management Technology, Lysa Myers explores how to ensure that BYOD doesn't become 'bring your own destruction' into the healthcare technology environment. Here are a few quotes from the article (see link at the bottom of the article for...
One and Zeroes: A Tale of Two Futures
Advances in digital technology have provided us with a long list of feature rich capabilities, yet the topic of cyber security often arises as corporate and government networks are hacked and users of this advanced technology fall prey to identify theft. In this talk...
Ammyy Admin malware – how criminals are using you!
If you downloaded Ammy Admin, you may be harboring malware. Users of 'Ammyy Admin' may have been unwittingly downloading malware along with their remote desktop software tools. A group known as the Buhtrap gang is using the malware to spy-on and control victims’...
California has been collecting infant DNA since 1983
and SELLING IT!! Yes - California collected DNA from infants born in their state - stores it in Richmond, CA - and has been selling it to third parties for "research". The screening tests are generally mandatory under state law. When the program was first developed in...
Security blogger Graham Cluley’s site experiences DDoS attack
Welcome to the club Graham - all of us who blog on security get minor attention from the scumbags with power to inconvenience our sites, our traffic, our servers etc. Even our office is under a DNS Relection attack - and has been for MONTHS. Thank you Sophos for the...
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.
"*" indicates required fields