SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page
FIREBALL – The Chinese Malware of 250 Million Computers Infected

FIREBALL – The Chinese Malware of 250 Million Computers Infected

by Joseph Forbes | Jun 10, 2017 | HACKING, INTERNET, Internet Scam Notices, KnowledgeBase (KB), SECURITY, TECHNOLOGY

Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware,  Fireball, takes over target browsers and turns them into zombies. Fireball...

Ransomware WannaCry Report

by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals

Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...
What Are ‘Black Hat’ and ‘White Hat’ Hackers?

What Are ‘Black Hat’ and ‘White Hat’ Hackers?

by Joseph Forbes | Apr 17, 2017 | Blog Entry, EDUCATION, HACKING, INTERNET, SECURITY, SOCIAL ENGINEERING

A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial. Other times, hacking is harsh and done with the wicked goal to hurt people...

FBI Warns Healthcare Industry of FTP Attacks

by Joseph Forbes | Mar 27, 2017 | Blog Entry, DATA, HACKING, PRIVACY, SECURITY, TECHNOLOGY

The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) has issued an alert to warn the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers that allow anonymous access. According to the law enforcement...

How Can Hosting Providers Prevent Website Blacklisting

by Joseph Forbes | Mar 19, 2017 | Blog Entry, DATA, INTERNET, KnowledgeBase (KB), Malware Reports, SECURITY, Technicals, TECHNOLOGY, Web Hosting

Websites getting blacklisted is a very extensive problem faced by businesses. When it happens, web masters panic and the vendors face an interruption in their daily business as they struggle to assist their concerned consumers to clean their websites and return...

4-Step Protection Strategy for DDoS Attacks

by Joseph Forbes | Mar 14, 2017 | Blog Entry, DATA, HACKING, INTERNET, KnowledgeBase (KB), SECURITY, Technicals

Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A...
« Older Entries
Next Entries »

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy