Ryuk ransomware is dangerous and spreading.   Attackers are causing more trouble with Emotet and TrickBot, as these forever morphing troublemakers are now dropping Ryuk ransomware. Once the valuable data has been extracted from victim organizations, Ryuk takes over and locks up information, requiring a ransom be paid in order to access the info. It […]

We would like to wish you a very happy and productive 2019! We look forward to taking care of your technology needs throughout the new year!

Two-factor authentication doesn’t stop hackers from phishing Gmail and Yahoo info   A new Amnesty International report has been released that gives insight on how some hackers break into Gmail and Yahoo accounts, even those accounts with two-factor authentication (2FA) enabled. 2FA is an added layer of authentication added on to some accounts in an […]

Up to 6.8 million users public and private photos on Facebook potentially exposed.   Facebook posted a blog on December 14, 2018 with the intention of notifying their developer ecosystem of a photo API bug. The bug may have affected people who used Facebook Login and granted permission to third-party apps to access their photos. […]

Researchers are using brainwaves to create hacker-resistant computer security   Passwords in and of themselves are generally insecure. Unfortunately, passwords, even those with letters, numbers and symbols, are relatively easily hacked. To combat this problem, biometrics has been taking the place of insecure passwords. By using fingerprints, facial recognition and retina scans as a way […]

Printers, IP phones and IP cameras among devices vulnerable to attack   A 10-year-old security flaw has left nearly a half-billion Internet of Things devices vulnerable to cyberattacks at businesses worldwide. The web exploit causing all of the trouble is called DNS rebinding.  It’s an attack first disclosed at the RSA Conference in 2008. It’s […]

Failure to change a default router password has led to sensitive military information being stolen.   It’s been discovered that a hacker is selling sensitive military documents online. Those documents include maintenance course books for servicing MQ-9 Reaper drones, an M1 ABRAMS tank operation manual, a crewman training and survival manual, a document detailing platoon […]

Where to go to listen to and remove what Amazon’s Alexa has recorded in your home.   Amazon’s Alexa is always listening for wake words. As was previously discussed in a prior blog post, one family found out the hard way that not all of what Alexa is listening to are things you want her […]

Amazon’s Alexa recorded this family’s conversation and sent it to a contact.   Using technology to handle the running of our homes has always carried the inherent privacy concerns that come with having devices that are attuned to always listen to conversations going on around them. Does the loss or potential loss of our privacy […]

The FBI has issued a recommendation for everyone to reboot due to malware   **Please be advised that if you’re using a CradlePoint router from RHYNO, you are already protected and don’t need to worry. We’ve already taken care of everything; your security and privacy were not compromised. Hackers have switched their focus and have […]