Posts by PDX Information Technology Services
Corrupt Politicians?
Don’t Fall For Office 365 Zoom Notification Phishing Email
Do you use Microsoft Office 365? Do you also use Zoom? If so, be advised that there’s a new phishing campaign designed with you specifically in mind, the goal of which is to ultimately make off with your Office 365 login credentials. Since the start of the global pandemic, Zoom and other video conferencing solutions…
Read More7 VPNs that you thought were safe
7 VPNs that leaked their logs – the logs that “didn’t exist” VPNs are all the rage these days, because they’re supposed to boost your privacy and stop you being tracked. In fact, “VPN” has become a word in its own right, pronounced vee-pee-en, and it’s a crowded market with companies advertising online, on TV…
Read MoreMajor University In California Pays Ransome!
The University of San Francisco (UCSF) is the latest organization to fall victim to hackers, running afoul of a group utilizing the Netwalker ransomware strain. UCSF is a research university whose recent efforts have been focused on health sciences generally and COVID-19-related research specifically. On June 3rd, 2020, Netwalker published a notice on a site…
Read MoreSlow Internet?
Here are some quick tips to improve the speed of your wifi/router.
Read MoreNew Powerful Malware Is Targeting Windows-Based Machines
Researchers have discovered a devilishly clever new stain of malware currently in use by hackers around the world. The new strain is appropriately called “Lucifer,” and has been making life quite difficult for IT professionals managing Windows environments. The malware exploits critical vulnerabilities in Windows-based systems to launch DDoS attacks and install cryptojacking code. The…
Read MoreHackers Attacking Exchange Servers In New Warning From Microsoft
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest Microsoft statistics, which show a marked increase in the use of web shells on on-premises Exchange servers. The company is currently tracking multiple ongoing attacks, some of which…
Read MoreU.S. Senators Banning the Use of Strong Encryption
Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act “ending the use of ‘warrant-proof’ encrypted technology by terrorists and other bad actors to conceal illicit behavior.” Experts and privacy advocates think it can effectively outlaw strong encryption. As the name may suggest, the Lawful Access to Encrypted Data Act (LAED Act,…
Read MoreLawsuit Claims Google Private Browsing Isn’t Really Private
Google is in hot water with a complaint filed to the District Court of Northern California. The complaint alleges that the tech giant tracks users’ browsing data and a variety of other identifying information via Google Ad Manager, Google Analytics, and a variety of other applications. It tracks data even when users are accessing the…
Read MoreIntel Steps Up Game With CPU-Level Malware Protection
Tech companies both big and small are always looking for new ways to protect their customers from the threat of malware. While that’s not something that hardware vendors are known for, Intel has leapt into the fray with a recent announcement. Their planned “Tiger Lake” mobile processers will offer CPU-level malware protection features. Tom Garrison…
Read More