by Joseph Forbes | Oct 30, 2017 | Blog Entry, HACKING, HARDWARE, INTERNET, SECURITY, SOFTWARE, Technical Support, Technicals
Most broadband Internet connections stay “always on” – keeping you online at all times. Home network owners often leave their router, broadband modems and other gear powered up and operating constantly, even when not using them for long periods of...
by Joseph Forbes | Jun 10, 2017 | HACKING, INTERNET, Internet Scam Notices, KnowledgeBase (KB), SECURITY, TECHNOLOGY
Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball...
by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals
Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...
by Joseph Forbes | Apr 17, 2017 | Blog Entry, EDUCATION, HACKING, INTERNET, SECURITY, SOCIAL ENGINEERING
A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial. Other times, hacking is harsh and done with the wicked goal to hurt people...
by Joseph Forbes | Mar 27, 2017 | Blog Entry, DATA, HACKING, PRIVACY, SECURITY, TECHNOLOGY
The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) has issued an alert to warn the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers that allow anonymous access. According to the law enforcement...
by Joseph Forbes | Mar 14, 2017 | Blog Entry, DATA, HACKING, INTERNET, KnowledgeBase (KB), SECURITY, Technicals
Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A...