Last week, we talked about WannaCry 2.0 and how destructive it could be to a network. Now, there is a new menace on the loose and it is called the EternalRocks Worm. This malware not only uses more nasty tricks… Read More
Blog
WannaCry 2.0 is Sweeping the Nation
Last week, we talked about a critical SMB security oversight that Microsoft has not only been called out on, but has patched. However, there is a highly dangerous threat that is exploiting this security flaw and its name is WannaCry… Read More
Google Project Zero is At It Again!: Critical RCE Flaw Found in Windows MMPE
In a report from Google Project Zero members, this bug has been labeled “crazy bad.” As you may recall, Google’s Project Zero team is a group of internet security analysts that work tirelessly to uncover major vulnerabilities in various systems… Read More
Does your Android phone Have StageFright?
Android phones are quite prevalent in today’s society. In fact, Android phones account for approximate 81% of the 432 million phones sold in the last quarter. All this to say that the popularity of these phones is immense, and that… Read More
Phone Security is Exceptionally Important for Your Business
Today’s world is full of technology and without it, you cannot run an effective business. However, part of preserving your business’s longevity is ensuring the safety of your devices. Smart phone security is exceptionally important for your business whether you… Read More
Hackers Are Clever Indeed: Doxing and Baiting
As we’ve stated, one of the most dangerous tools in the hacker’s arsenal isn’t necessarily the code he or she is utilizing. The most dangerous tools in the arsenal of a hacker are their wits. By being clever, a hacker… Read More
Botnets Beware: BrickerBot is Here
We’ve talked a little bit about botnets when we talked about DDoS attacks. To go into a little more detail, a botnet is basically a huge army of computers or devices that are being utilized unbeknownst to the owner of… Read More
A Quick Guide to Trojans and Your Computer
Trojans are a type of malware that function much in the same way as the Trojan Horse from Greek mythology. They sneak in under a disguise and wreak havoc on your machine. Though they can be dealt with swiftly and… Read More
Don’t Let The Alma Locker Put Your Machine at Risk
As we have discussed in other blogs, ransomware is a type of malware that holds your files for ransom. All the hacker has to do is wait for you to land on an infected page. Once you’re there, a series… Read More
Have you been getting strange calls from Microsoft or Google?
You pick up the phone and on the other end is an automated voice that rattles off something about your Google business listing or how your Microsoft license is expired. There is a number to use to call them back…. Read More