Don’t Use Internet Explorer

Here’s the latest implied message from Microsoft to its valued clients: “Don’t use Internet Explorer”. Support is ending for Internet Explorer versions 8, 9 and 10. It has been suggested that users switch over to Microsoft’s newest Edge browser. There is, of course, the option of switching over to Internet Explorer 11 if you absolutely feel compelled to stick with the browser, though …

Antivirus Bug Steals Passwords

An uncomfortable news update on the cyber security circuit sheds light on the fact that an antivirus bug is now stealing user passwords. This is particularly disconcerting for both individuals and businesses who rely on antivirus software to keep hackers out. Anyone who has installed Trend Micro’s Antivirus on their Windows computer should be on high alert, as this is the source of …

Cyber Security and HIPPA Compliance

The threat of cyber attack on your business is very real. Healthcare companies and providers can be subject to civil and criminal penalties if they violate HIPAA standards by not being HIPAA compliant. Is your business HIPAA compliant? What about your IT vendor? Many small and mid-sized businesses simply do not know how to protect and defend against the threat …

Malware Caused a Power Outage

Cyber criminals have always had their eye on SCADA system. With the success of  Stuxnet malware, designed to thwart Iranian nuclear facilities, it is hardly surprising that hackers believe SCADA to be a worthy target. Towards the end of December, reports that malware caused a power outage in at least 3 regions of Ukraine made cyber headlines, proof positive that hackers are …

Chinese Hackers Rampant on Social Media

For many years the Tibet region of the Republic of China has been experiencing conflict. The threat continues online, where Chinese State-sponsored hackers target groups viewed as a threat to the nation; usually pro-democracy movements. The Tibetan community’s exclusive social networking site, unitib.com, is the most recent alleged ally of the Free Tibet movement to be targeted by Chinese hackers. …

TOR Announces Bug Bounty Program

In a somewhat revolutionary step, the non-profit organization responsible for TOR has announced what they call the ‘Bug Bounty Program.’ As the largest, most popular tool designed to grant anonymity online; it comes as no surprise that cyber security is a huge part of the functioning of the TOR network. The Bug Bounty Program, in a nutshell, is an incentive …

Efficient IoT Security Practices

The Internet has become the primary channel for communication and networking, making the global business community more accessible worldwide. Companies, as well as members of the public, increasingly rely upon this enhanced connectivity for day-to-day tasks and many other factors of daily life. In recent years this concept has evolved to include connectivity from a wide range of devices; giving …

Hyatt Hotel Group Hacked

The Hyatt Hotel Group has recently become the latest hotel group to  discover malware infecting the computers used for processing guests’ payments. Other notable victims include the Hilton, Trump Collection and White Lodging. As soon as the threat was discovered, a full investigation into the extent of the infection was launched with the help of third-party online security experts. While …

Cybersecurity Predictions for 2016

The past year has been a veritable whirlwind of cyber attacks. While the majority of hackers use their skills for monetary gain, there has been a growing number of ‘noral’ hackers, who are going after companies that they deem unethical. Now, with the new year just around the corner, it’s time to start thinking about staying ahead of these cyber …