Mac Thunderbolt Hack Could Leave Your Computer Vulnerable

January 5th, 2017

Do you use any sort of Thunderbolt device on your Mac? If you do, and you haven’t been keeping your OS up to date, you’ll definitely want the latest security patch. Recently, a security researcher named Ulf Fisk found a devastating security flaw that allows a corrupted Thunderbolt device to gain complete access to your system.

Google Creates New Operating System For Internet of Things

January 4th, 2017

Google is about to change the game where the Internet of Things (IoT) is concerned.
Recently, the company announced the release of Android Things, an operating system specifically designed for internet objects.

One of the main limitations internet objects have is memory and computing power, so the new OS is designed to operate with an extremely small footprint, no more than 32 to 64 MB.

Some time ago, Google announced an IoT OS concept called Brillo.

Update Flash Or Risk Vulnerability To Hackers

January 3rd, 2017

Yet more critical security flaws have been found in Adobe’s poor, beleaguered Flash Player. The company continues to fight gamely to keep pace, patching issues as quickly as they are found, but there doesn’t appear to be any end in sight.

The most recent bug, tracked as CVE-2016-7890, would have allowed hackers to take control of both a smartphone’s microphone and camera, enabling them to spy with impunity on users.

One Billion Yahoo Accounts Were Breached

January 2nd, 2017

This is a world record, although the honor of holding it is a dubious one. Yahoo recently announced that it was the victim of the largest data breach of all time, in which more than one billion user accounts were impacted. Yes, you read that correctly.

New Version Of Android Trojan Can Take Photos And More

December 31st, 2016

If you haven’t heard of a Trojan called Tordow, you probably will soon. Security researchers have been aware of it since February of this year, but recently, researchers from Comodo Security have unearthed a new, devastating upgrade to the malicious software.

Problems Connecting To Internet? May Be A Windows 10 Issue

December 30th, 2016

Microsoft made a mistake, and it could complicate your life.

If you’ve got your computer set up to receive automatic updates, you may have suddenly found yourself unable to connect to the internet after the December 9th update, labeled “KB3201845.”

That’s because changes in the code made it impossible for the OS to accept an IP address assignment.

Mac Users: Update Skype Now

December 29th, 2016

If you use a Mac, and you have a Skype account, you could be at risk. A previously undiscovered backdoor was recently found by researchers at SpiderLabs that would allow any moderately skilled hacker to take control of the app and use it to gain access to a variety of information, including:

• Any contact information the user has entered into Skype
• Call audio
• Chat sessions
• Incoming messages

All it takes is for the hacker to change the contents of a single line of code in the “Skype Dashbd Wdgt Plugin,” and they can gain control.

Finally Save Posts For Later Viewing In Instagram

December 28th, 2016

Do you use Instagram as part of your company’s marketing efforts, or to keep tabs on the competition? If so, the company has rolled out an exciting new feature you’re sure to love: the ability to save user posts for later viewing.

If this sounds familiar, that’s because it is.

Watch Out For Emails Asking To Do A HIPAA Audit

December 27th, 2016

There’s a new phishing email making the rounds that your firm needs to be aware of if you deal with protected health information (PHI) in any way and are subject to HIPAA rules and regulations.

The email is quite good, appearing for all intents and purposes to be an official communication from the Department of Health and Human Services, signed by its Directory, Joycelyn Samuels.

Cybercrime Rings Getting Smarter And More Sophisticated

December 26th, 2016

Cybercrime is growing up. Increasingly, on the Dark Web, customers can find a wide variety of hacking activities offered as a “service.” There is everything from DDOS attacks launched by massive ‘botnets to carefully orchestrated phishing campaigns to ransomware attacks.