New Updates To This Malware Made It More Dangerous

If you haven’t yet heard of a malware strain called ‘Predator the Thief’, it’s something that belongs on your radar. It first emerged as a threat in July of 2018, when it was used in conjunction with an extensive phishing campaign. In its original incarnation, it proved more than capable of stealing passwords, browser data, user names and the contents …

Landrys Restaurant Chain Latest Victim Of Credit Card Breach

If you’re not familiar with Landry’s, you’re probably familiar with at least some of the restaurants the company owns. The company recently issued a formal ‘Notification of Data Breach’ in which they disclosed that an unauthorized user was detected on their systems and that POS malware had been used between March 13, 2019 and October 17, 2019. In addition to …

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old ‘Law Enforcement Lock’ trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works like this: Scammers will redirect users using the Chrome web browser to sites that host a full-screen image of a Windows 10 desktop with a notice that appears …

Support For Many Microsoft Apps Will Stop In 2020

The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous amount of change. If you’re an IT manager, be aware that this year a number of Hallmark Microsoft products will reach their End of Support. That means the company won’t be issuing any further security patches for newly …

Message Recall Feature May Be Added To Office 365

For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows them to recall messages that have been sent using Outlook, which is an Exchange Online hosted cloud email service for business. They can un-send the emails, provided that the recipient is using Outlook and the messages haven’t been …

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment because it allows attackers to disguise their payloads as an innocent, standard file type. In terms of scope and scale, …

Windows 7 End of Life

Windows 7 Support Officially Ends Today

Windows 7 End of Life has arrived. Microsoft is ending support for this aging operating system on January 14, 2020. This means a decade after introducing Windows 7, Microsoft will no longer provide security updates or patches unless you purchase Extended Security Updates from Microsoft. Tech support from Microsoft for any Windows 7 issues also ends today. We strongly recommend …

Kids Can Bypass Communication Limit Feature On iOS 13.3

If you have children that own Apple devices, be aware that the latest update for iOS 13.3 included a feature called Communications Limits. It is designed to allow parents to set up parental controls to keep their kids from speaking to, texting with, or Facetiming with anyone who’s not already in their contacts list. It’s a small but important feature …

Windows 10 Update Caused Issues With File Explorer

Have you already installed Windows 10, build 1909? If so, then you’ve probably noticed that the latest build update introduced a few bugs to Windows File Explorer. After installing the latest build, users began reporting issues with the search field that caused it to become unresponsive and the search box to become blurry. Other users reported that after the latest …

Citrix Applications Need Patch To Address Vulnerability

Researchers at Positive Technologies recently discovered a serious vulnerability in Citrix Enterprise products that threatens the security of more than 80,000 companies in 158 countries around the world. The issue is being tracked as CVE-2019-19781. If it is left unpatched, it puts companies using either product at risk of phishing attacks, malware, cryptojacking attacks ,and DDoS attacks. That is to …