There’s at least one thing Republicans and Democrats can agree on in the US Senate: the importance of open-source software in today’s tech world. Seriously. As US Senator Gary Peters (D-MI) said last week, “Open-source software is the bedrock of the digital world.“ His partner across the aisle, Rob Portman (R-OH), agreed, saying, “The computers, […]
Microsoft Warns: Hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers, that in reality lead to malware attacks. According to threat analysts from Microsoft’s advanced persistent threat (APT) research group, a phishing hacking crew, linked to North Korea’s armed forces, has […]
The most common victims targeted work at organisations that weren’t using multi-factor authentication (MFA) to secure their accounts. Business Email Compromise (BEC) attacks are one of the most lucrative forms of cyber crime: According to the FBI, the combined total lost is over $43 billion and counting, with attacks in at least 177 countries. These attacks […]
Cloud applications and software have become a key part of everyday life for employees and businesses. Enhance your cyber security awareness to avoid simple errors that can make your cloud an easy target for hackers. The popularity of cloud applications and software has risen significantly in recent years, and while using cloud services can be beneficial […]
New Technology: The Aircove Wi-Fi 6 routeroffers an onboard virtual private network for under $200 and has cleared a full security audit from Cure53. One of the world’s largest virtual private network providers, ExpressVPN, has launched its first router with a built-in VPN. Making it the first Wi-Fi 6 consumer router to arrive on the market that […]
The dark web, or darknet, is the part of the internet that is difficult to access without the proper tools and authorizations. An average, everyday web surfer using a commonly-available web browser like Chrome or Explorer isn’t likely to be taking a virtual walk on the dark side, but security leaders still must make an […]
The Issue: Recently we came across an issue where someone had inadvertently installed a newer Office 365 version on to their remote desktop server. Yes, I know they shouldn’t be able to but IT consultant’s recommendations are not always followed, and they didn’t have a license for it, so Excel would not work. What Was […]
Cyber crime is on the rise, and cyber criminals are exploring new ways of conducting distributed denial of service (DDoS) attacks. Making them harder to protect against and more effective at causing disruption. DDoS attacks are a relatively simple, but potent, form of cyberattack in which cyber criminals overload services with web traffic, slowing them down […]
Cyber attacks targeting vulnerabilities in internet browsers are on the rise, with Google Chrome being a main target for hackers. According to analysis by cybersecurity researchers at WatchGuard, the second quarter of this year saw an overall 23% increase in malware attacks against browsers, Chrome, Firefox, and Internet Explorer, compared to the previous quarter. Much […]