877-886-6332 [email protected]
  • Contact Us
  • Hosting Login
  • Remote Support
  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
  • RSS
Computer Security Solutions
  • About Us
  • Get Help With
    • Backup & Disaster Recovery
    • Cyber Security
    • Domain Registration
    • Email Security
    • Managed IT Services
    • Staff Education & Testing
    • Working Remotely
  • Small Business Solutions
    • Cyber Security & SMBs (Free Download)
    • Cyber Security & Cloud Computing (Free Download)
  • Become a Reseller
  • Blog
Select Page
Ransomware Authors increasingly targeting Businesses

Ransomware Authors increasingly targeting Businesses

Jan 27, 2016 | Cyber-Crime, Data Breaches, Malware and Exploits

Cybercriminals are increasingly targeting businesses with ransomware, according to a new report. The Online Trust Alliance (OTA)’s 2016 Data Protection and Breach Readiness Guide found that there has been a surge in this type of attack. Ransom demands have also become...

Wendy’s Investigates Possible Credit Card Breach

Jan 27, 2016 | Cyber-Crime, Data Breaches, Malware and Exploits

In a report today in KrebsOnSecurity.com, we have learned that fast food chain Wendy’s Restaurants is investigating the possibility of a credit card breach.  According to the respected security blogger, Brian Krebs, the investigation stems from inquiries made by...

Hyatt Card Breach Hits 250 Hotels in 50 Nations

Jan 20, 2016 | Cyber-Crime, Data Breaches, Malware and Exploits

Have you stayed, eaten or relaxed at a Hyatt hotel or property between Aug. 13 2015 and Dec. 8, 2015? If so, there is a very good chance that your credit or debit card data was stolen by unknown cyber thieves who infiltrated many of the hotel chain’s payment...

Hilton Wordwide Credit Card Breach Announcement

Nov 26, 2015 | Cyber-Crime, Data Breaches, Malware and Exploits

Hilton Credit Card Breach: Hilton Worldwide announced that it had discovered and removed malware designed to steal payment card information from restaurants, gift shops and other point-of-sale systems at some of its hotel properties. So, if you’ve stayed at one...

Ensuring BYOD isn’t “bring your own destruction”

Nov 23, 2015 | Buying Security Products, Data Breaches, General Security

In a recent article in Health Management Technology, Lysa Myers explores how to ensure that BYOD doesn’t become ‘bring your own destruction’ into the healthcare technology environment. Here are a few quotes from the article (see link at the bottom of...

Ammyy Admin malware – how criminals are using you!

Nov 15, 2015 | Browser Security, Cyber-Crime, Malware and Exploits

If you downloaded Ammy Admin, you may be harboring malware.  Users of ‘Ammyy Admin’ may have been unwittingly downloading malware along with their remote desktop software tools. A group known as the Buhtrap gang is using the malware to spy-on and control...
« Older Entries
Next Entries »

Recent Posts

  • Understanding Your Cybersecurity Exposure Points for Small Businesses and the Benefits of Managed IT Services March 10, 2025
  • Getting Remote Support October 27, 2024
  • CyberSecurity Tips for Small Businesses and Solopreneurs – What you need to know about CyberSecurity September 11, 2024
  • Beyond Basic Anti-Malware: The Case for Enhanced Cybersecurity Measures July 31, 2024
  • The IT Administrator’s Conundrum: Free vs Paid, or Time vs Money July 9, 2024

Computer Security Solutions

  • Home
  • About Us
  • Contact Us
  • Remote Support
  • Become a Reseller
  • Blog
  • Terms | Privacy | Legal

Get Help With

  • Cyber Security
  • Backup & Disaster Recovery
  • Email Security
  • Hosting Login
  • Managed Services
  • Solutions for Small Businesses
  • Staff Education & Testing

Contact Us

Support / Helpdesk
Get a Trial or Quote

877-886-6332
[email protected]

  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
  • RSS
  • Partner with us
  • Managed Services
  • Security News You Can Use
  • Remote Support
We use cookies to provide you the best web experience. Your continued use this site is consent to use of these cookies.YesNo