Blog

Facebook Under Investigation For Massive Data Leak

The Irish Data Protection Commission has launched an investigation into the massive leak of Facebook user data online. It was recently revealed that the personal data of more than 530 million Facebook users had been posted in a low-level hacking forum, with users’ phone numbers being offered for sale. Facebook’s defence is that the data…

Capcom: Ransomware gang used old VPN device

Capcom has released a final update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals. In early November 2020, Ragnar Locker ransomware hit the Japanese game developer and publisher, forcing Capcom to shut down portions of…

FBI hacks into hundreds of infected US servers

FBI hacks into hundreds of infected US servers (and disinfects them) Of course you do – it was the name behind a foursome of Exchange bugs that got patched in an emergency update early in March 2021. Even though there was just a week to go until March 2021’s Patch Tuesday, Microsoft decided to issue…

Apple Mail Security Vulnerability Allows Email Snooping

The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two .ZIP files attached. A zero-click security vulnerability in Apple’s macOS Mail would allow a cyberattacker to add or modify any arbitrary file inside Mail’s sandbox environment, leading to a range of attack types. According to…

6 Phases to Guide Your COVID-19 Planning and Response

Businesses have had to adjust very quickly to the global health crisis. It’s imperative to provide context to help successfully navigate these uncharted waters. This guide illustrates the different phases of needs and planning efforts during the COVID-19 crisis. Identifying which phase your business is currently in will help you develop guidelines and ongoing response…

3f7fe6_2ed51a0187cd4954b765c17aa595c1c1mv2

Technology as a Utility

Technology is rapidly becoming a standard utility, much like the water and electricity that flows into our homes and businesses. You turn on the switch and you have electricity for a monthly fee that only fluctuates when add that new television or you ‘use’ more power. I.T. is becoming the same way, with the monthly…

Spotify Gets Hit Again

Protection against credential stuffing isn’t something that a company like Spotify should struggle with, and suffering two credential stuffing incidents in one quarter shows a sloppy attitude toward security. As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify has returned for another appearance with a credential stuffing disaster eerily…

Why is my computer running so SLOW??!!??

This is a common question I get on a daily basis. In fact, there is no one thing that is causing this slowness, but a combination of several things. It could be an application that is taking all of the resources, such as SQL. (or what I like to call, Miss Piggy) You could have…

Far worse than reported.

Lack of proof of compromise, is not the lack of compromise. The assumption should be that any system hit was entirely compromised. Assumptions are what allowed this to occur. By now you have all heard about the cyber attack that used SolarWinds Orion to exploit and compromise many businesses. Well, it is far more reaching…