by Joseph Forbes | Jun 10, 2017 | HACKING, INTERNET, Internet Scam Notices, KnowledgeBase (KB), SECURITY, TECHNOLOGY
Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball...
by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals
Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...
by Joseph Forbes | Apr 17, 2017 | Blog Entry, EDUCATION, HACKING, INTERNET, SECURITY, SOCIAL ENGINEERING
A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial. Other times, hacking is harsh and done with the wicked goal to hurt people...
by Joseph Forbes | Mar 26, 2017 | Blog Entry, DATA, INTERNET, KnowledgeBase (KB), TECHNOLOGY
This list describes common causes of slow Internet connections in homes. A poorly performing connection can be caused by broadband router configuration errors, wireless interference, or any of several other technical issues with your home network. Use these tips to...
by Joseph Forbes | Mar 19, 2017 | Blog Entry, DATA, INTERNET, KnowledgeBase (KB), Malware Reports, SECURITY, Technicals, TECHNOLOGY, Web Hosting
Websites getting blacklisted is a very extensive problem faced by businesses. When it happens, web masters panic and the vendors face an interruption in their daily business as they struggle to assist their concerned consumers to clean their websites and return...
by Joseph Forbes | Mar 14, 2017 | Blog Entry, DATA, HACKING, INTERNET, KnowledgeBase (KB), SECURITY, Technicals
Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A...