Quantcast
Channel:
Viewing all 191 articles
Browse latest View live

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

$
0
0

b2ap3_thumbnail_ransomware_cryptowall_400.jpgBe advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.


Windows Server 2003 End of Support Date Looms on the Horizon

$
0
0

b2ap3_thumbnail_windows_logo_400.jpgThe next major operating system to get the ax from Microsoft is Windows Server 2003. Slated to have its mainstream support ended on July 14th, businesses that currently use the software need to begin making plans to upgrade their system as soon as possible. With this server operating system no longer being supported by Microsoft, your data will be vulnerable to the latest online threats.

How to Remove the Super Dangerous Superfish App from Your PC

$
0
0

b2ap3_thumbnail_superfish_two_400.jpgAs seen by the recent Superfish app debacle, software that comes preinstalled on a new PC shouldn’t always be trusted. Most of the time, the innate software on a device can be trusted; but the Superfish application is an exception. This app, which came preinstalled on new Lenovo PCs between the months of September and December of 2014, can potentially compromise the security of your machine.

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

$
0
0

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

$
0
0

b2ap3_thumbnail_malware_lock_up_400.jpgThere’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

$
0
0

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Do You Use Steam for PC Gaming? Watch Out for this New Malware!

$
0
0

b2ap3_thumbnail_steam_malware_problems_400.jpgMalware has traditionally targeted industries that are exceptionally profitable. For example, hackers like to target retailers for their wealth of financial credentials. One of the most profitable industries, entertainment, is also subject to similar torment, including Steam, the PC gamer’s most valuable tool for gaming binges.

It’s the End of the Line for Microsoft SQL Server 2005 - Are You Prepared?

$
0
0

b2ap3_thumbnail_microsoft_sql_eos_date_passed_400.jpgDo you know which database management system is used by your company’s servers? Obviously your end users aren’t expected to know the answer to this question, but this is something that you, as a business owner, need to be aware of. If you don’t keep track of which database software you’re using, you might accidentally wait too long and wind up running an unsupported piece of software. For example, you need to move away from SQL Server 2005 (which is now unsupported) as soon as possible.


Alert: New Petya Ransomware Spreads via Fake Online Resumes

$
0
0

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

$
0
0

b2ap3_thumbnail_the_end_software400.jpgAll business owners should be aware of which Microsoft products they use. It’s one of the many complex and confusing parts of managing your technology. Of course, all great things must eventually come to an end, and the same applies to your mission-critical applications and operating systems. When your solutions can no longer be considered secure and are no longer supported by the developer, you know it’s time to move on and upgrade to something better.

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

$
0
0

b2ap3_thumbnail_microsoft_end_of_life_400.jpgWhat kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

Alert: 7-Zip Software Can Leave Your System Vulnerable

$
0
0

b2ap3_thumbnail_7zip_vulnerability_400.jpgSoftware vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

$
0
0

b2ap3_thumbnail_android_malware_400.jpgYou don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

$
0
0

b2ap3_thumbnail_new_petya_friend_400.jpgThe ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hapless user clicked the file, Petya would get to work.

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

$
0
0

b2ap3_thumbnail_alert_windows_and_edge_updates_400.jpgMicrosoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.


Alert: Microsoft Outlook Users Be Wary of New Ransomware

$
0
0

b2ap3_thumbnail_ransomware_money_400.jpgRansomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Exploits From the NSA are Now on the Black Market

$
0
0

b2ap3_thumbnail_deployment_of_nsa_malware_400.jpgIf you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools--a dangerous concept.

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

$
0
0

b2ap3_thumbnail_pin_theft_400.jpgBanks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

Tip of the Week: Here’s Your PC’s Wish List for National Clean Out Your Computer Day

$
0
0

b2ap3_thumbnail_embrace_clean_your_pc_day_400.jpgDo you know what today is? It’s National Clean Out Your Computer Day! This means that there is no time like the present to make sure that you’re taking good care of your business’s technology assets. In honor of this day, we’ll discuss ways in which you can take better care of your technology.

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

$
0
0

b2ap3_thumbnail_do_you_have_a_data_leak_400.jpgIn recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

Viewing all 191 articles
Browse latest View live




Latest Images