Archive for the ‘Security’ Category

  • Technology has changed the way that we do business. This is true of nearly every industry, and it is equally true for criminals and con artists. What started as “Nigerian Prince” email scams have evolved into detailed and targeted attacks using our reliance on technology as a weapon against us. In the InfoSec community, we call this “Social Engineering,” “Psychological Attacks,” or “Digital Con-Jobs.” A Difficult Situation It’s Friday afternoon, and your boss emails you, from what looks to be their personal ...Read More »

  • During the final week of June, a malware named Petya – or NotPetya, or Goldeneye, depending on who you ask – began its assault upon computers in 65 countries. Arguably a more complex version of the attack that rampaged last spring, also called Petya (hence the naming scheme), this malware has small and large companies around the globe scrambling. According to Microsoft, the malware attack originated from a tax software based out of Ukraine, which is now under fire for ignoring ...Read More »

  • In the early hours of Friday, May 12, 2017, a hack now dubbed WannaCry began spreading like wildfire. For those unaware: Leaked alleged NSA hacking tools appear to be behind a massive cyberattack disrupting hospitals and companies across Europe, Asia and the U.S., with Russia among the hardest-hit countries.  The unique malware causing the attacks — which [had] been spotted in tens of thousands of incidents in 99 countries, according to the cyber firm Avast — ...Read More »

  • Large breaches of username and password combinations are becoming far more frequent. In the past few years we’ve seen users of LinkedIn, Dropbox, Adobe, Myspace, and now Yahoo! fall victim to hacks of username and password databases. You’re probably thinking “What do I care if someone can get into my Myspace account. I haven’t touched it in 8 years.” Well, who cares indeed? Unless, of course, you’ve used that same email address and password combination somewhere else. Hackers that get their hands ...Read More »

  • Before unloading your old computers (mobile phones, iPods, etc.), there are several things to consider. Security should be your biggest concern in the current paperless, everything-is-online, digital age. It is quite simple to find data on old hard drives and really kind of scary to think about the personal and/or business information you might be throwing away. If you're a business owner, consider the computers used by your accounting and HR departments or managers. Simply deleting these sensitive files (bookkeeping ...Read More »