by Master User | Apr 23, 2016 | Blog
Are you still using single factor authentication in your business? If so, you are taking an unnecessary risk. If the only thing standing between the hacking community and your company’s data is a password, then no matter how robust those passwords might be, it’s just...
by Master User | Apr 22, 2016 | Blog
Toy manufacturing giant Mattel was recently the target of a whaling scam that could have been both highly embarrassing and extremely costly, if not for a single stroke of luck. If you’ve not heard the term, “whaling” is a subset of the phishing scams that hackers...
by Master User | Apr 21, 2016 | Blog
More problems for the Adobe Flash player, and a new type of hacking attack that security experts are referring to as “Typosquatting.” If you’ve not yet heard the term, you’re not alone, but you can bet that it will be making headlines in the months ahead. So far, this...
by Master User | Apr 20, 2016 | Blog
If you have Apple QuickTime installed on a Windows-based PC, you should uninstall it immediately. In a public statement issued on 4/14/2016, the US-CERT recommends the removal of QuickTime for Windows. Apple announced that they’re no longer supporting the product in...
by Master User | Apr 15, 2016 | Blog
If you use Google Chrome, you might have the “Better History” extension installed. If you do, and you’ve upgraded it recently, you’ve probably seen a large influx of advertising on your screen. Yes, you guessed it, hackers have found yet another avenue of attack, this...
by Master User | Apr 14, 2016 | Blog
You’ve probably heard that last year, Trump Hotels were successfully breached, and an unknown number of customer credit cards compromised. In fact, what makes last year’s breach of Trump Hotels remarkable as compared to the breaches of a number of other hotel chains...