/IT Security

The many types of cyber criminals, part 2

Espionage     The purpose of espionage, can range from hacking individual computers or devices and ending with illegal mass surveillance, of governments or even entire populations.  It boils down to secret tracking of our personal lives.  Another for of cybercrime that can be engaged as  physical espionage (for example, using web or CCTV cameras [...]

By | 2017-12-13T16:06:16+00:00 December 13th, 2017|IT Security|Comments Off on The many types of cyber criminals, part 2

The many types of Cybercriminals, part 1

Cybercrime is any criminal activity where the object as a target and / or tool is a computer or network device.  In some cybercrimes, direct attacks are carried out on computers or other devices for the purpose of disabling a target.  In others, computers are used to distribute malware, illegal information, images and other materials [...]

By | 2017-12-12T14:06:56+00:00 December 8th, 2017|IT News, IT Security|Comments Off on The many types of Cybercriminals, part 1

MacOS High Sierra: A Fatal Flaw.

A huge flaw has recently been discovered in the newest operating system High Sierra on Apple laptops and desktops. This flaw gives a would be attacker the ability to access the admin rights to your system without a password. In fact, the only word needed is "root." After the initial login the assailant wont have [...]

By | 2017-11-28T18:05:02+00:00 November 28th, 2017|IT News, IT Security, Software News|Comments Off on MacOS High Sierra: A Fatal Flaw.

Android exploit shows your screen to anyone

Specialists MWR Labs spoke up recently about a new, rather interesting vector of attacks on Android-devices. The researchers claim that their attack will work against gadgets running Lollipop, Marshmallow and Nougat, which is about 77.5% of all devices running the android operating system. The key component of the attack is the service MediaProjection, a program [...]

By | 2017-11-27T09:46:55+00:00 November 27th, 2017|Cell Phones, IT Security, Software News|Comments Off on Android exploit shows your screen to anyone

Microsoft patches 17 year old Office vulnerability

As part of the "Tuesday Updates," Microsoft released security updates that address 53 vulnerabilities in the manufacturer's products, including the CVE-2017-11882. This has been a problem in Microsoft Office for over 17 years. The vulnerability allows executing malicious code without interaction of the user and is present in all versions of the software. The vulnerability, [...]

By | 2017-11-17T09:35:00+00:00 November 17th, 2017|IT Security, Software News|Comments Off on Microsoft patches 17 year old Office vulnerability

Can hackers talk to your kids?

Researchers from the British consumer protection organization  found vulnerabilities in smart toys with Bluetooth or Wi-Fi connection support, allowing attackers to talk to children. As the study showed, four of the seven toys tested can be used to communicate with children playing with them. Vulnerabilities were found in toys such as the Furby Connect, i-Que [...]

By | 2017-11-17T09:27:14+00:00 November 16th, 2017|IT Security|Comments Off on Can hackers talk to your kids?

Scammers have mimicked a popular Microsoft program to make a quick buck

ESET, a popular anti-virus solution, discovered a site that spreads the fraudulent version of Windows Movie Maker, a popular Microsoft program for creating and editing video. The site hits the top of the Google and Bing search engines. Support for Windows Movie Maker was terminated by Microsoft on January 10, 2017, the program is not available for download [...]

By | 2017-11-13T16:26:04+00:00 November 10th, 2017|IT Security, Software News|Comments Off on Scammers have mimicked a popular Microsoft program to make a quick buck

What you need to know about the Fall Creators Update

Though peppered in throughout the year, usually installing after staying up way too late, or right before that big presentation in front of the whole office, new Windows updates are hardly the most exciting thing to happen in your day.  I'd even be willing to bet you find them to be quite irritating.  Though not [...]

By | 2017-10-27T14:13:17+00:00 October 25th, 2017|IT news and stories, IT Security|Comments Off on What you need to know about the Fall Creators Update

Countless systems exposed through WPA2

Over the weekend it was discovered  the most widespread security standard for wireless internet has been found to have a massive security vulnerability that can leave your encrypted data visible to anyone who happens to be snooping.  This flaw is most prevalent on Android smartphones, leaving 40% of currently running systems exposed.  But, due to [...]

By | 2017-10-16T18:10:31+00:00 October 16th, 2017|IT Security, Software News|Comments Off on Countless systems exposed through WPA2

Pizza Hut falls victim to hacking, users report fraudulent charges on their credit cards

If you have ordered pizza from Pizza Hut online from the website or mobile application during the morning of October 1, 2017 through midday on October 2, 2017, it would be a wise idea to check your credit card statement for fraudulent charges.  Pizza Hut has just announced during that time frame they had been [...]

By | 2017-10-16T17:15:51+00:00 October 16th, 2017|IT News, IT Security|Comments Off on Pizza Hut falls victim to hacking, users report fraudulent charges on their credit cards