Category Archives: Security

  • ‘Wormable’ Microsoft vulnerability: BlueKeep

    Posted on June 14, 2019 by in News, Security

    Blog by Linda Lingle, CISSP, PMP CSB Technology Partners Security Analyst BlueKeep Have RDP open to the outside?  You may want to close that.  Last month’s Microsoft Patch Tuesday was more critical than most.  All Microsoft Patch Tuesday’s are important, but this one is worth getting out of your chair and doing the patch…now. Important […]

    Comments Off on ‘Wormable’ Microsoft vulnerability: BlueKeep Continue Reading...
  • WhatsApp discovers ‘targeted’ surveillance attack

    Posted on May 17, 2019 by in News, Security

    Hackers were able to remotely install surveillance software on phones and other devices using a major vulnerability in messaging app WhatsApp, it has been confirmed. WhatsApp, which is owned by Facebook, said the attack targeted a “select number” of users and was orchestrated by “an advanced cyber-actor”. A fix was rolled out on Friday. On […]

    Comments Off on WhatsApp discovers ‘targeted’ surveillance attack Continue Reading...
  • Chrome 74 Patches 39 Vulnerabilities

    Posted on April 26, 2019 by in News, Security

    Google this week released Chrome 74 to the stable channel with patches for 39 vulnerabilities, as well as with several other tweaks inside. Of the 39 security fixes included in the new browser iteration, 19 were for vulnerabilities reported by external researchers. These include 5 High severity flaws, 12 Medium risk bugs, and 2 Low […]

    Comments Off on Chrome 74 Patches 39 Vulnerabilities Continue Reading...
  • Hiding in Plain Sight

    Posted on April 12, 2019 by in News, Security

    This blog was written by Jon Munshaw and Jaeson Schultz. Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam. This often means pursuing cybercriminals wherever they congregate. However, instead of wheeling-and-dealing using hidden servers on some mysterious dark web […]

    Comments Off on Hiding in Plain Sight Continue Reading...
  • Spotlight on Troldesh Ransomware, aka ‘Shade’

    Posted on March 22, 2019 by in News, Security

    Despite the decline in the number of ransomware infections over the last year, there are several ransomware families that are still active. Ransom.Troldesh, aka Shade, is one of them. According to our product telemetry, Shade has experienced a sharp increase in detections from Q4 2018 to Q1 2019. When we see a swift spike in detections of […]

    Comments Off on Spotlight on Troldesh Ransomware, aka ‘Shade’ Continue Reading...
  • Major Security Flaws Found in Popular Password Managers

    Posted on March 15, 2019 by in News, Security

    Independent Security Evaluators found some worrying flaws in popular password managers, but still suggest that you use one. Password managers, which have been suggested to internet users from all cybersecurity experts, are convenient and ensure the security of your account, but what if they are the source of vulnerability? A new report suggests that these […]

    Comments Off on Major Security Flaws Found in Popular Password Managers Continue Reading...
  • Setting up a Wi-Fi Network for your Small Business

    Posted on February 22, 2019 by in News, Security

    For any modern small business, whether a café, shop, restaurant or office, there comes a time when you need to start taking your Wi-Fi setup seriously. As I explained in my previous blog about how to make the most of your Wi-Fi network, it can bring in new customers, increase productivity, and provide overall cost-savings. etting […]

    Comments Off on Setting up a Wi-Fi Network for your Small Business Continue Reading...
  • Why User Names and Passwords Are Not Enough

    Posted on February 8, 2019 by in News, Security

    Over the past few years, it’s become evident that attackers are no longer “hacking” to carry out data breaches ― they are simply logging in by exploiting weak, stolen, or otherwise compromised credentials. That’s why this month’s discovery of a massive repository of 773 million email addresses and more than 21 million passwords floating on the Dark […]

    Comments Off on Why User Names and Passwords Are Not Enough Continue Reading...
  • Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution

    Posted on February 1, 2019 by in News, Security

    Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation […]

    Comments Off on Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution Continue Reading...
  • Not Every Phishing Attack Starts with Spam Email

    Posted on January 25, 2019 by in News, Security

    When we think of phishing, most of us imagine a conventional phishing attack that begins with a legitimate-looking email. It might appear to come from an e-commerce site with which you happen to do business. “We’ve lost your credit card number. Please follow the link to re-enter it,” the email says. But the link leads […]

    Comments Off on Not Every Phishing Attack Starts with Spam Email Continue Reading...