An Exploited Website Can Cause Apple Products To Crash

Users of Apple tech have a new reason to worry.  A security researcher named Sabri Haddouche, who works for an instant messaging app called “Wire,” has published a proof of concept web page. It contains a fatal exploit that can crash and restart iPhones, iPads and any Mac. Essentially then, …

Popular NAS Device May Easily Be Compromised

Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too.  The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of …

Malware Reports Continue To Rise 

We’ve known for some time now that the next big crisis the internet will have to come to grips with is the dramatic rise of the Internet of Things (IOT). The problem isn’t with the devices themselves, which are enormously helpful and rapidly growing in their popularity.  Rather, it lies …

Your Business Email Is Highly Targeted For Attacks

There’s a new report out, authored by ProofPoint, and its findings for business are grim. It’s no secret that businesses of all shapes and sizes are coming under increasing fire from hackers around the world. Now we have hard data that shows us exactly how big of an increase we’re …

Tech Support Scammers Are Advertising Online 

Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …

Hacker Requests For Wire Transfers Are Topping Email Scams

Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …

Most Small Businesses Can’t Recover From Cyber Breaches

A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …

If You Use Photoshop, Update Immediately

Do you use Photoshop? Does anyone who works for you use it?  If so, you’ll want to apply the latest security patch immediately. Two new vulnerabilities were discovered after the release of Adobe’s regularly scheduled August 2018 security patch update. This prompted the company to take the unusual step of …

Fax Machines Might Be Gateway To Next Hacker Attack

Nothing bad could possibly happen to your company’s network if the only piece of information the hackers have is your fax number, right? Unfortunately not, according to recent research by employees at Check Point. They recently revealed details about not one, but two different REC’s (Remote Code Execution) techniques that …

Connecting To Airport Wi-Fi Puts Your Data At Risk

File this away under things you already knew.  Coronet recently released a report entitled “Attention All Passengers:  Airport Networks Are Putting Your Devices & Cloud Apps At Severe Risk,” and the news is about what you’d expect.  The report was more than five months in the making. The analysts poured …