Posts by PDX Information Technology Services
Facebook Under Investigation For Massive Data Leak
The Irish Data Protection Commission has launched an investigation into the massive leak of Facebook user data online. It was recently revealed that the personal data of more than 530 million Facebook users had been posted in a low-level hacking forum, with users’ phone numbers being offered for sale. Facebook’s defence is that the data…
Read MoreCapcom: Ransomware gang used old VPN device
Capcom has released a final update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals. In early November 2020, Ragnar Locker ransomware hit the Japanese game developer and publisher, forcing Capcom to shut down portions of…
Read MoreFBI hacks into hundreds of infected US servers
FBI hacks into hundreds of infected US servers (and disinfects them) Of course you do – it was the name behind a foursome of Exchange bugs that got patched in an emergency update early in March 2021. Even though there was just a week to go until March 2021’s Patch Tuesday, Microsoft decided to issue…
Read MoreApple Mail Security Vulnerability Allows Email Snooping
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two .ZIP files attached. A zero-click security vulnerability in Apple’s macOS Mail would allow a cyberattacker to add or modify any arbitrary file inside Mail’s sandbox environment, leading to a range of attack types. According to…
Read More6 Phases to Guide Your COVID-19 Planning and Response
Businesses have had to adjust very quickly to the global health crisis. It’s imperative to provide context to help successfully navigate these uncharted waters. This guide illustrates the different phases of needs and planning efforts during the COVID-19 crisis. Identifying which phase your business is currently in will help you develop guidelines and ongoing response…
Read MoreTechnology as a Utility
Technology is rapidly becoming a standard utility, much like the water and electricity that flows into our homes and businesses. You turn on the switch and you have electricity for a monthly fee that only fluctuates when add that new television or you ‘use’ more power. I.T. is becoming the same way, with the monthly…
Read MoreSpotify Gets Hit Again
Protection against credential stuffing isn’t something that a company like Spotify should struggle with, and suffering two credential stuffing incidents in one quarter shows a sloppy attitude toward security. As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify has returned for another appearance with a credential stuffing disaster eerily…
Read MoreWhy is my computer running so SLOW??!!??
This is a common question I get on a daily basis. In fact, there is no one thing that is causing this slowness, but a combination of several things. It could be an application that is taking all of the resources, such as SQL. (or what I like to call, Miss Piggy) You could have…
Read MoreFar worse than reported.
Lack of proof of compromise, is not the lack of compromise. The assumption should be that any system hit was entirely compromised. Assumptions are what allowed this to occur. By now you have all heard about the cyber attack that used SolarWinds Orion to exploit and compromise many businesses. Well, it is far more reaching…
Read MoreCorporate Networks Being Targeted By New Ransomware
There’s a new threat actor on the hacking world stage, going by the name “OldGremlin”, and they’re causing some serious damage to corporate networks around the world. The group’s malware campaign seems to have begun back in March of this year (2020) and for the moment, at least, is centered in Russia. Of course, it…
Read More