877-886-6332 [email protected]
  • Contact Us
  • Hosting Login
  • Remote Support
  • LinkedIn
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • RSS
Computer Security Solutions
  • About Us
  • Get Help With
    • Backup & Disaster Recovery
    • Cyber Security
    • Domain Registration
    • Email Security
    • Managed IT Services
    • Staff Education & Testing
    • Working Remotely
  • Small Business Solutions
    • Cyber Security & SMBs (Free Download)
    • Cyber Security & Cloud Computing (Free Download)
  • Become a Reseller
  • Blog
Select Page

AV Comparatives July/August Mac Security Roundup

Sep 8, 2014 | Buying Security Products, Computer Security Solutions, Malware and Exploits

The July and August roundup of Mac security products marks the first time (that we can remember) when respected Antivirus comparison laboratory AV-Comparatives has tested macinoths products. Their linking rules prevent us from linking directly to the results, but here...

J.P. Morgan Hacked Because Malware Infects Employee PC

Aug 28, 2014 | Cyber-Crime, Data Breaches, Malware and Exploits

This morning, the Wall Street Journal reported on the front page that J.P. Morgan was hacked and suffered a cyberheist called “a significant breach of corporate computer security”. Bloomberg reported that the FBI, the US Secret Service, and even the NSA...

Evolving Zeus malware used in targeted email attacks

Jul 14, 2014 | Malware and Exploits

According to ZDNet – a new strain of the infamous Zeus malware has been discovered using Windows PIF files and being spread via email campaigns. Websense has identified this Zeus strain as an information stealing trojan. Their ThreatSeeker Intelligence Cloud has...

Malware hidden in Chinese inventory scanners targeted logistics, shipping firms

Jul 12, 2014 | Cyber-Crime, Malware and Exploits

According to an article in PCWorld.com – financial and business information has been stolen from multiple shipping + logistics firms using a complex malware embedded into scanners shipped to the supply-chains handlers. The scanners are typically used to track...

Hack News: Montana Government Department Hacked, 1.3 Million Records Exposed

Jun 25, 2014 | Cyber-Crime, Data Breaches, Malware and Exploits

New is emerging that in a targets attack by hackers, the state of Montana’s Department of health has been breached – meaning that up to 1.3 million people’s personal data has been compromised as the servers at the Department of Public Health and...

Heartbleed security flaw – what you need to know…

Apr 9, 2014 | General Security, Malware and Exploits

The Heartbleed security flaw (also known as CVE-2014-0160) is a very serious flaw in the openSSL library, which is library used to secure communications between computers including servers around the world. The library is used for different reasons – but some...
« Older Entries
Next Entries »

Recent Posts

  • Which ESET Protect Plan Is Best for Your Business? Full Comparison of Entry, Advanced, Complete & MDR January 15, 2026
  • Ransomware: What Every Business Owner Needs to Know (And Do) to Stay Safe June 9, 2025
  • Why Monthly ESET Protection is the Best Choice for Small Businesses June 2, 2025
  • Cyber Scammers Are Targeting Small Businesses and Home Users — Here’s How to Protect Yourself May 27, 2025
  • Understanding Your Cybersecurity Exposure Points for Small Businesses and the Benefits of Managed IT Services March 10, 2025

Computer Security Solutions

  • Home
  • About Us
  • Contact Us
  • Remote Support
  • Become a Reseller
  • Blog
  • Terms | Privacy | Legal

Get Help With

  • Cyber Security
  • Backup & Disaster Recovery
  • Email Security
  • Hosting Login
  • Managed Services
  • Solutions for Small Businesses
  • Staff Education & Testing

Contact Us

Support / Helpdesk
Get a Trial or Quote

877-886-6332
[email protected]

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • RSS
  • Partner with us
  • Managed Services
  • Security News You Can Use
  • Remote Support