Category: <span>Business advice</span>

Sneaky password spray attacks are quite effective at being bad It’s not uncommon to have several different email addresses. Nor is it uncommon to not check every email address every day for security notifications. Unfortunately, that’s exactly what hackers using Password Spray Attacks are hoping for. Typically, when users think about the hacking of their […]

Hardware-based 2FA security can up your protection from hacks A great way to boost the security of your online accounts is to use a hardware key. Two-factor authentication – also referred to as 2FA or multi-factor authentication – provides extra protection from attacks by requiring the use of secondary verification in addition to a password […]

Hackers have leaked more than 900 VPN passwords It’s been reported that a hacker has published a list of over 900 plaintext usernames and passwords of Pulse Secure VPN enterprise servers – as well as IP addresses – to a Russian-speaking hacker forum that is frequented by multiple ransomware gangs. Tech reporting company, ZDNet, obtained […]

Windows 7 end-of-life prompts FBI warning The Federal Bureau of Investigation issued a warning about the dangers of using Windows 7 now that the operating system has reached its official end-of-life. In the statement the FBI released, they stated, “The FBI has observed cyber criminals targeting computer network infrastructure after an operating system achieves end […]

End-to-end encryption will be available to everyone on Zoom Zoom stirred up additional trouble for themselves in late May when they announced that only paying customers would receive end-to-end encryption (E2EE) when on Zoom calls. This information caused severe backlash and several groups reached out to share their privacy concerns with Zoom. Thankfully, on June […]

Zoom has great features, but not so great security In recent times, video calls have become even more of a necessity to businesses and educational entities alike. With that, Zoom has becoming an increasingly popular choice for videoconferencing. Unfortunately, Zoom doesn’t seem to be up to the task of protecting their users by keeping their […]

Working from home helps lessen the spread of the Coronavirus, but creates openings for hackers With the Coronavirus pandemic spreading quickly, there’s been a mass movement of employees working remotely in an effort to limit exposure and slow down the virus’ transmission rate. While this is an excellent move to make in regards to the […]

What’s the difference between web hosting and domain hosting? Web hosting and domain hosting often get confused, but are very different services. The problem is all in the name. While the name ‘Web Hosting’ accurately describes the service of the provider hosting your website on the internet, Domain Hosting is better understood when it’s referred […]

Intel CPUs released since 2013 are impacted by Zombieload v2 In May of this year, the Zombieload vulnerability, which affects older Intel CPUs, was disclosed to the public. Zombieload now has a second variant that also works against more recent Intel processors. This means that Cascade Lake, Intel’s latest line of high-end CPUs, is also […]

Motorola releases a walkie-talkie and cellphone hybrid to help first responders In emergencies, smartphones aren’t always able to live up to their potential, (for instance, when a hurricane or tornado knocks down cell towers, or if a forest fire disrupts the communication infrastructure in remote areas). For reasons like these, first responders rely on land […]