by Joseph Forbes | Jun 10, 2017 | HACKING, INTERNET, Internet Scam Notices, KnowledgeBase (KB), SECURITY, TECHNOLOGY
Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball...
by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals
Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...
by Joseph Forbes | Apr 17, 2017 | Blog Entry, EDUCATION, HACKING, INTERNET, SECURITY, SOCIAL ENGINEERING
A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial. Other times, hacking is harsh and done with the wicked goal to hurt people...
by Joseph Forbes | Mar 27, 2017 | Blog Entry, DATA, HACKING, PRIVACY, SECURITY, TECHNOLOGY
The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) has issued an alert to warn the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers that allow anonymous access. According to the law enforcement...
by Joseph Forbes | Mar 19, 2017 | Blog Entry, DATA, INTERNET, KnowledgeBase (KB), Malware Reports, SECURITY, Technicals, TECHNOLOGY, Web Hosting
Websites getting blacklisted is a very extensive problem faced by businesses. When it happens, web masters panic and the vendors face an interruption in their daily business as they struggle to assist their concerned consumers to clean their websites and return...
by Joseph Forbes | Mar 14, 2017 | Blog Entry, DATA, HACKING, INTERNET, KnowledgeBase (KB), SECURITY, Technicals
Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A...