Data Fencing: A Crucial Component of Smart Information Security Policies in 2023

February 28, 2023

Small Businesses Beware: The Growing Importance of IT Security in Insurance Renewals

February 22, 2023

Why Outsourcing Your Business IT to a Managed Service Provider is the Smart Choice

February 3, 2023

Why Mobile Device Management (MDM) is Essential for Today’s Extended Networks

January 26, 2023

Why Regular Reconciliation of Microsoft Active Directory is Critical for Security and Compliance

January 25, 2023
Phisher

Stay Ahead of Phishers

January 20, 2023

Major Security Issue Affecting Microsoft Windows Users: KB2267602 Defender Update Causing Loss of Application Shortcuts

January 13, 2023

Preparing Your Auto Dealership for the FTC’s Safeguards Rule: How COMNEXIA Can Help

January 11, 2023

Why Microsoft Teams Phone System is the Best Choice for Your Business

January 9, 2023

Why VoIP is the Best Choice for Modern Businesses

January 8, 2023

LogoKit Simplifies Office 365, SharePoint ‘Login’ Phishing Pages

January 29, 2021

RENEW IT

August 12, 2020
You work hard to build a great business and service your customers. But if you are like many companies you need to focus on your core business leaving little time for innovation. You are certain that technology can either set your business apart or cost you that big account … but IT can be so complicated and expensive.

DANABOT TROJAN TARGETS BANK CUSTOMERS IN PHISHING SCAM

July 18, 2020
A NEW PHISHING SCAM PURPORTS TO BE MYOB INVOICES – BUT REALLY CONTAINS A NOVEL BANKING TROJAN. The recently-discovered DanaBot banking trojan is making the rounds in a phishing campaign that targets potential victims with fake invoices from software company MYOB.

HOW DO YOU STAY CYBER SAFE WHILE HEADING OUT ON A SUMMER VACATION?

July 12, 2020
Whether you are out exploring or relaxing, it is important to strive to be as secure as possible with your digital devices and information. Unfortunately, travel can open you up to different points of vulnerability compared to normal everyday use at home, and we don’t just mean accidentally going swimming with your cell phone.

PDF FILES CAN BE ABUSED TO STEAL WINDOWS CREDENTIALS

May 10, 2020
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security researcher with cyber-security Check Point. Baharav published research this week showing how a malicious actor could take advantage of features natively found in the PDF standard to steal NTLM hashes, the format in which Windows stores user credentials.

RESEARCHERS HACKED AMAZON’S ALEXA TO SPY ON USERS, AGAIN

May 1, 2020
A malicious proof-of-concept Amazon Echo Skill shows how attackers can abuse the Alexa virtual assistant to eavesdrop on consumers with smart devices – and automatically transcribe every word said.

TYPOSQUATTING OR URL HIJACKING

April 30, 2020
25 APR TYPOSQUATTING OR URL HIJACKING Posted at 14:13h in NEWS / BLOG by Lana Wilson 0 Comments 0Likes Typosquatting attempts to take advantage of typographical errors (i.e. “typos”) introduced by users when URLs are typed directly into the address bar. By capitalizing on user error, cyber threat actors funnel unsuspecting users to illegitimate domains that closely mimic originals.

POLICE SHUT DOWN WORLD’S BIGGEST ‘DDOS-FOR-HIRE’ SERVICE–ADMINS ARRESTED

April 24, 2020
In a major hit against international cybercriminals, the Dutch police have taken down the world’s biggest DDoS-for-hire service that helped cyber criminals launch over 4 million attacks and arrested its administrators. An operation led by the UK’s National Crime Agency (NCA) and the Dutch Police, dubbed “Power Off,”

KNOW WHAT INFORMATION IS BEING COLLECTED WHEN YOU VISIT A WEBSITE

April 18, 2020
When visiting unknown websites, be vigilant about protecting your identity. Remember that some information is automatically made visible to the site. Information such as the computer’s IP address, domain name (e.g., .com, .gov, or .edu), software details, and page visit information is often saved in cookies so that the organization may develop and store user profiles of website visitors.

18 APR CROOKS HIJACK ROUTER DNS SETTINGS TO REDIRECT USERS TO ANDROID MALWARE

April 18, 2020
Malware authors have hijacked DNS settings on vulnerable routers to redirect users to sites hosting Android malware. According to Kaspersky Labs telemetry data, these were small-scale attacks, as crooks only hijacked traffic from just 150 unique IP addresses, redirecting users to malicious sites around 6,000 times between February 9 and April 9, 2018.

CONNECT WITH US