Blog

Apple Mail Security Vulnerability Allows Email Snooping
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two .ZIP files attached. A zero-click security vulnerability in Apple’s macOS Mail would allow a cyberattacker to add or modify any arbitrary file inside Mail’s sandbox environment, leading to a range of attack types. According to…

6 Phases to Guide Your COVID-19 Planning and Response
Businesses have had to adjust very quickly to the global health crisis. It’s imperative to provide context to help successfully navigate these uncharted waters. This guide illustrates the different phases of needs and planning efforts during the COVID-19 crisis. Identifying which phase your business is currently in will help you develop guidelines and ongoing response…

Technology as a Utility
Technology is rapidly becoming a standard utility, much like the water and electricity that flows into our homes and businesses. You turn on the switch and you have electricity for a monthly fee that only fluctuates when add that new television or you ‘use’ more power. I.T. is becoming the same way, with the monthly…

Spotify Gets Hit Again
Protection against credential stuffing isn’t something that a company like Spotify should struggle with, and suffering two credential stuffing incidents in one quarter shows a sloppy attitude toward security. As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify has returned for another appearance with a credential stuffing disaster eerily…

Why is my computer running so SLOW??!!??
This is a common question I get on a daily basis. In fact, there is no one thing that is causing this slowness, but a combination of several things. It could be an application that is taking all of the resources, such as SQL. (or what I like to call, Miss Piggy) You could have…

Far worse than reported.
Lack of proof of compromise, is not the lack of compromise. The assumption should be that any system hit was entirely compromised. Assumptions are what allowed this to occur. By now you have all heard about the cyber attack that used SolarWinds Orion to exploit and compromise many businesses. Well, it is far more reaching…

Corporate Networks Being Targeted By New Ransomware
There’s a new threat actor on the hacking world stage, going by the name “OldGremlin”, and they’re causing some serious damage to corporate networks around the world. The group’s malware campaign seems to have begun back in March of this year (2020) and for the moment, at least, is centered in Russia. Of course, it…

New Malware Maker Got Past Apple Security
Apple has been historically very good at keeping malware out of their app store, and they’re constantly improving their security protocols on that front. In fact, since February of this year (2020), all Mac software distributed outside of its Mac App Store must be notarized by Apple. The developers must demonstrate that their products are…

Google Working To Help Warn Users Of Earthquakes
Unless you live within a couple hundred miles of the town of Sparta, NC, you may not be aware of the fact that recently, a 5.1 earthquake struck the area. It damaged a few homes and rumbles could be felt as far away as north Georgia and parts of Virginia. It is doubtful that the…