Category Archives: Blog

Vulnerabilities Found In Consumer Based Routers And Devices

The SOHOpelessly Broken 2.0 study has been released by Independent Security Evaluators . The picture it paints of routers and the so-called ‘smart’ devices that make up the rapidly expanding Internet of Things (IoT) is not pretty. The researchers sum up their findings as follows: “Today, we show that security controls put in place by […]

LastPass User Credentials May Have Been Exposed To Hackers

Do you use the password manager LastPass?  If so, you’re certainly not alone.  In recent years it has seen its popularity surge and has grown to become the most popular app of its type on the web.  Unfortunately, last month, Tavis Ormandy (part of Google’s Project Zero team) discovered a critical flaw in the app’s […]

Intel Server Processors Are Vulnerable To Attack

Researchers at Vrije Universiteit, in Amsterdam have discovered a disturbing new side-channel attack. All Intel server-grade processors made since 2012 are vulnerable to what has been dubbed NetCAT. That stands for Network Cache Attack and it exploits a weakness in Intel’s Data Direct I/O (DDIO) feature. DDIO is specific to Intel’s server-grade processors and is […]

Companies Are Losing Billions To Business Email Compromises

The FBI’s statistics on BEC (Business Email Compromise) are alarming to say the least.  Over the last twelve months, the law enforcement agency has witnessed a 100 percent increase in the identified global exposed business losses attributable to BEC. Between June 2016 and July 2019, there were a total of 166,349 BEC incidents reported to […]

Your Google Calendar Settings May Be Sharing Your Info

Twelve years ago, Google introduced a new feature to Google Calendar that allowed users to share their calendars with others.  It’s a great feature and invaluable in a corporate environment because it gives teams an easy way to collaborate.  Google itself even touted the “make it pubic” feature of their calendar as being a cool […]

New Ransomware Called TFlower Hacks Into Company Networks

Over the last two years, ransomware attacks have become increasingly common against businesses of all shapes and sizes. While the attack vector saw a dip in popularity last year, this year it has come roaring back to the fore with several new strains of ransomware being developed and enjoying widespread use by hackers around the […]

USB 4 Is Coming, And It Will Be Much Faster

USB four has been in the pipeline for quite some time now. Finally, in the second half of 2020, we’ll start seeing devices coming to market that take advantage of the new and improved technology.  Based on Thunderbolt 3 technology, the latest iteration of the tech will boast transfer speeds of up to 40 Gigabytes […]

Malware Now Hiding Inside Fake Copies Of Online Books

Kaspersky Lab has recently issued a warning that should alarm and dismay students around the world.  Based on the findings of some of the company’s researchers, they’ve discovered a new surge in malware masquerading as legitimate digital textbooks. Given the staggering price of physical textbooks, many students have changed to acquiring digital copies of the […]

Poshmark Retailer Member Passwords Are Being Sold Online

There is grim news for users of the online marketplace Poshmark, which is a thriving community where people buy and sell used clothing and other accessories.  Recently it has come to light that the login details of more than 36 million of the company’s 40 million members were acquired by an unauthorized third-party.  Worse, those […]

Hackers Can Now Use Fake Voices To Steal Money

You’ve almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered to give the appearance of some prominent figure or another saying something that he or she never actually said. It’s a clever, computer generated ruse. The reason it’s been making […]