Lessons Learned from Yahoo breach for Small Businesses
How the hack began According to FBI news, the hack began with a straight forward spear-phishing scam. It took only one employee to click...
Mac and Skype: Intersection Provides for a Backdoor
Skype is a well-used and accepted application used to communicate, for consumers and commercial purposed, with a combined auditory and...
USB Kill: Yet One More Item to be Concerned With
There are constantly new attacks on various pieces of equipment, both consumer and commercial. With so many vulnerabilities and such a...
UK Hospitals ALSO Victims of Malware
Attackers have a single focus in many of these cases. This may be to embarrass the entity, have the accounting department urgently wire...
Android Devices: Yet More Issues
Recently, there have been two examples of malware discovered in devices using Android. These downloader Trojans were found to be in the...
When, not if...
The number of businesses through the nation is rather large. Many of these know they are regularly targeted. Too many of the remainder...
Cloudflare data leak may impact small businesses
A security risk that is being compared in magnitude to 2014 Heartbleed security problem was announced last week. Cloudflare, an internet...
Scottrade’s Breach Causing Headaches & Liability
When there is a breach, generally the target information is sold or otherwise used for malicious purposes. For instance, if a retail...
WCC14 Domain name privacy for small businesses
Your business does not want to be caught in the embarrassing position in which Sean Spicer, White House press secretary, recently found...
Cyber-Vigilantism
There have been a number of scams perpetrated over the years. These have preyed on the elderly, less than tech savvy, grandparents, and...