Devices Attached To Corporate Networks Are Being Targeted

Grim news comes out of Russia, as reported by Microsoft.  The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium. Their other names include APT28 and Fancy Bear. Microsoft has confirmed that the group was behind a new attack that took place in April of this year (2019). This is …

Survey Shows Employees Would Compromise Company Data

A recent report published by nCipher confirms what many business owners have known for a long time.  Their employees are the weakest link when it comes to data security. The nCipher report, however, adds a disturbing exclamation point to the data with a few details you’re likely to find shocking. First, fully 71 percent of C-Suite employees surveyed in the …

Unexpected Support Updates For Older Systems Released By Microsoft

Users of Windows XP, Windows 2003, Windows 7 and Server 2008 got an unexpected benefit from Microsoft recently. All of the OS’s mentioned above have reached the end of their support lives and the company hasn’t been issuing new security updates for them. However, they made a rare exception in the case of patching CVE-2019-0708. CVE-2019-0708 is a critical security …

Adobe Removing Older Software And Products Is Upsetting Users

Adobe is facing harsh criticism after they began sending letters out to portions of their user base. The letters inform users of Creative Cloud that older versions of the products they’re using have been discontinued and licenses to use those products have been revoked. Users are to stop using them immediately and upgrade to newer versions or they “may be at …

Hackers Continue To Attack POS Transactions And Systems

Have you heard of DMSniff?  If you’re in the restaurant, entertainment, or retail business and you haven’t heard of it, this article is likely to dismay you. It’s the latest threat being deployed against those industries. Researchers from the cybersecurity company Flashpoint now believe that DNSniff malware has been lurking in the wild since at least 2016. It has proved …

Iconic Software Adobe Shockwave Unavailable After April

It’s the end of an era.  Way back in 1995, a company called Macromedia released the iconic Shockwave player, which quickly became a mainstay on Windows-based machines. A decade later, Adobe purchased Macromedia, taking ownership of the Shockwave player and the company’s other  products (like Flash), both of which continued under the Adobe brand. Time has not been kind to …

Bots Are Attacking Retail Sites On A Large Scale

If you own a retail business, an attack known as “credential stuffing” is the latest online threat to be concerned about.  If you’re not sure what that is, read on and prepare to be dismayed. According to the 2019 State of the Internet, Retail Attacks, and TPI Traffic Report published by Akamai, there has been an surge in large scale …

Email Provider VFEmail Had All Data Destroyed By Attacker

Do you use VFEmail?  If so, we’ve got bad news for you. Hackers have successfully attacked the system and wiped all data from all of its servers in the US. All data on those servers has been lost.  That means every email you had in your inbox and everything you had archived is gone. According to a company spokesman, “At …

Average Ransomware Attack Payments Total $6,700 Per Incident

How much does a successful ransomware attack cost a victim on average?  The numbers will terrify you. Based on the latest statistics compiled by Coveware, each incident of a compromised computer costs a whopping $6,733, which is a hefty 13 percent increase from just one quarter ago. Part of the increase stems from the fact that some strains known for …

Software Similar To MS Office May Include Hacking Vulnerabilities

A small but growing number of people have been making the switch to MS Office clones like Apache’s OpenOffice and LibreOffice. The thinking is that they can get the same core functionality but avoid many (if not most of) the costs, bugs, flaws and weaknesses that have plagued Microsoft’s offering.  This situation is often seen as low-hanging fruit by hackers …