Blog
Security Layers Make Sense: A single protective technology means a single point of failure
Security Layers Make Sense: Computer Security Solutions has always advocated a layered approach to security – this article from We Live Security underscores our point fairly well.
PHISHING: Great News! You got Phished! Better news if you you can spot them!
Phishing emails are seemingly 'just a part of life'. Scammers send them; email providers filter most of them out, but a few always seem to get through. It's funny how they seem to rely on a couple of different social engineering tricks. Whether it be fear, greed,...
PHISHING: Blind Trust in Email Can Cost You Your Home
Jon and Dorothy Little, who in November of 2016, at the closing on a house they were buying, found out that a phishing attack from a fraudster had tricked them into wiring their house funds to the wrong bank account. The months of worry and anguish were just starting.
Is cybersecurity now as important as health and safety?
It could be argued, cybersecurity awareness should factor as part of World Day for Safety and Health at Work – officially or otherwise (it’s a great opportunity to raise awareness of workplace-related health and safety). We think it could be included for a number of reasons.
Hajime Botnet reaches 300,000 infected IoT devices: Has Huge Potential for Damage
Security experts are keeping a close eye on the Hajime botnet, which is now estimated to have passed 300,000 infected IoT devices. By comparison, the Mirai botnet was estimated to be about 400,000 devices, when it was deployed in DDoS attack against Dyn back in 2016,...
CyberSecurity Hole in One was a Big Hit at TopGolf Centennial!
TopGolf was the venue we selected for April 2017's 'CyberSecurity Hole in One': [csg_call_to_action call_yymm="1704" call_type="events"...
Locky Ransomware is back, wrapped inside a Word Document, inside a PDF File
Security researchers have discovered a new spam campaign which started last Friday, where ransomware is downloaded and run by a macro hidden inside a Word document that is in turn nested within a PDF, like a Russian nesting dolls - or matryoshka dolls. The ransomware...
Webroot mistakenly flags windows files as malicious and Facebook as a Phishing Site
It's unclear how so many legitimate Windows files and one of the world's best-known websites were flagged in a huge false positive fracas, but that's the situation that many thousands of Webroot found themselves in yesterday. Antivirus vendor Webroot had a rather...
ESET Finds Flashlight Trojan in Google Play Store – Google Removes It
Android users were targeted by a banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Google was notified and removed the application - however, 5,000 or so users had downloaded the app before it was removed from the...
Nearly 9,000 malware-laden servers, compromised websites found in Singapore-based Interpol operation
Interpol is claiming success after discovering close to 9,000 malware command and control (C&C) servers and 270 infected websites across the Asean region. The Interpol Press Release revealed that the infected servers even included government servers: SINGAPORE –...
95 Percent of Enterprises Found Employees Actively Seeking Ways to Bypass Corporate Security Protocols
In a recently released Insider Threat Intelligence Report from Dtex Systems, it was revealed that in a whopping 95% of organizations, employees are actively attempting to bypass the security protocols and procedures put in place to protect them. This report is both...
Google Chrome Updates to 58.0.3029.81 today
Today sees the release of the latest version of Google Chrome for Windows 10 64-bit to 58.0.3029.81. You are advised to update your Google Chrome today.
IT Professionals – Have your Say! – What do your customers need to know?
To our fellow IT + IT Security both hobbyist + professional friends, we are putting together an article on the top things your IT guy/gal needs you to do for yourself, or to understand about security, or dealing with IT security professionals.
The almost impossible to detect phishing attack in detect on Chrome, Firefox and Opera
This is one of those instances where the Microsoft and Apple browser beat out the competition – because this problem is mainly affecting Google Chrome, Mozilla Firefox and Opera browsers.
Hackers have found a way of registering domains using unicode characters, which look like they are other websites… ie, they can not fake a domain you might have a login to, and the faked address can be nearly impossible to spot.
Learn how to fight this in at least Firefox, and when you might expect a fix from the other browsers.
IRS warns of Phishing Attacks this (and every) Tax Season
The IRS warns us every year, that Tax Season brings an increase in the number of phishing attacks targeting the unwary, pretending to be from the Internal Revenue Service. This year is no different and here is the advice offered by the IRS this year.
NSA-leaking Shadow Brokers just dumped its most damaging release yet
The Shadow Brokers—the mysterious person or group that over the past eight months has leaked a gigabyte worth of the National Security Agency’s weaponized software exploits—just published its most significant release yet. Friday’s dump contains potent exploits and hacking tools that target most versions of Microsoft Windows and evidence of sophisticated hacks on the SWIFT banking system of several banks across the world.
Coming soon – a new endpoint protection partner…
We have a new endpoint protection partner... Once we've brought a few things in-line with our company way of doing things, we'll be announcing this new partnership! Stay tuned for details ...
Shoney’s Restaurants is rumored to be part of another POS Breach
Long time security blogger and journalist, Brian Krebs, is reporting that Shoney’s restaurants is rumored to be at the center of another card breach.
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.
"*" indicates required fields