Prevention - centric cybersecurity
blog

BLOG

Using Oracle Software? Update Now

It’s been a busy week at Oracle. The company has recently released a massive flurry of patches that fix a staggering 136 security issues for a wide range of the products it sells. This release comes...

Microsoft Releases Optional Update to Secure Wireless Mouse From Threat

Last year, an IoT (Internet of Things) security firm called Bastille Networks uncovered an attack from an unexpected vector. Hackers can actually take control of your wireless mouse, which has no...

Have You Enabled Two Factor Authentication Yet?

Are you still using single factor authentication in your business? If so, you are taking an unnecessary risk. If the only thing standing between the hacking community and your company’s data is a...

Even Large Company Employees Get Hit By Phishing/Whaling Scams

Toy manufacturing giant Mattel was recently the target of a whaling scam that could have been both highly embarrassing and extremely costly, if not for a single stroke of luck. If you’ve not heard the...

Mistypying A Web Address Could Put Malware On Your System

More problems for the Adobe Flash player, and a new type of hacking attack that security experts are referring to as “Typosquatting.” If you’ve not yet heard the term, you’re not alone, but you can...

Urgent News: US Government Urges Removal of QuickTime for Windows

If you have Apple QuickTime installed on a Windows-based PC, you should uninstall it immediately. In a public statement issued on 4/14/2016, the US-CERT recommends the removal of QuickTime for...

Are You Sharing Your Passwords?

The statistics are both shocking and dismaying. Even in the face of innumerable high profile data breaches, people still aren’t serious about personal data security. In fact, a shocking 95% of people...

Ransomware Continues to Evolve

“What’s old is new again.” The simple truth is that tastes and trends seem to repeat. We’ve seen it countless times in the world of fashion, and now, we’re seeing something similar in the hacking...

Your Server May Be Open To Ransomware Exploits

The hacking community seems to have found another viable business model, this time, in the form of ransomware. Given the success that hackers have been finding with this type of attack lately, they’ve...