Search Posts

Category: News

How Hackers Use DNS Tunneling to Own Your Network

By: Ron Lifinski, Cyber Security Researcher DNS Tunneling Most organizations have a firewall that acts as a filter between their sensitive internal networks and the threatening global Internet. DNS tunneling has been around for a while.  But it continues to cost companies and has seen hackers invest more time and effort developing tools.  A recent study[1] found that DNS attacks in the UK alone have risen 105% in the past year.  DNS tunneling is attractive–hackers can […]

Offering: Email Protection

For just $3.95/month/machine, The IT Guys helps protect against the most common attack vector today for viruses and ransomware: How it works• Traditional pattern, message attribute and characteristic matching are complemented by algorithmic analysis for ultimate threat detection without impacting accuracy.• Behavioural analysis alone includes over 10,000 algorithms analysing more than 130 variables extracted from each email message.• Multiple signature and behaviour-based antivirus engines offer protection from all forms of malware, including zero-day variants:    […]

OCR Secures $2.175 Million HIPAA Settlement After Hospitals Failed to Properly Notify HHS of a Breach of Unsecured Protected Health Information

In an agreement with the Office for Civil Rights (OCR) at the U.S Department of Health and Human Services (HHS), Sentara Hospitals (Sentara) have agreed to take corrective actions and pay $2.175 million to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification and Privacy Rules.  Sentara is comprised of 12 acute care hospitals with more than 300 sites of care throughout Virginia and North Carolina. Read the HHS Press […]

Why Macs are so slow will sadden you if you own one…

CUK USA: Powerful, attractive, and affordable, check out these gaming desktops starting at $349.99 or shop for new laptop or monitor: Thanks to Computer Upgrade King for sponsoring! Apple’s got some great hardware, but lately there’s been one major flaw that’s held them back from making full use of it… Buy an iMac from Apple: Buy a Mac Mini from Apple: Buy an Acer Desk Mini: On Amazon: On Newegg: […]

October 2019 is National Cybersecurity Awareness Month

Check out this 2019 Toolkit Handbook for ways to benefit: Excerpt: “OWN IT.” Understand your digital profile. Internet-based devices are present in every aspect of our lives: at home, school, work, and on the go. Constant connection provides opportunities for innovation and modernization, but also presents opportunities for potential cybersecurity threats that can compromise your most important personal information. Understand the devices and applications you use every day to help keep you and your […]

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer. I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced the pop-up asking if I wanted to trust this computer. All expected behaviour. But this […]

TechRadar: Need new RAM or SSDs? Better act fast, prices may rise soon.

RAM and SSD prices might see price hike from manufacturers Hopefully the cost of RAM doesn’t increase too much Over the last few months we’ve been enjoying some pretty low prices for the best RAM and SSDs. However, that might be ending soon, as some SSD manufacturers are reportedly discussing price hikes.  According to a report from Digitimes, SSD manufacturers are planning to raise prices by 10-15% on NAND flash, which would make SSDs more expensive. This is reportedly […]

Agent Smith: 16 Android Apps You Need to Delete

BY BHASWATI GUHA MAJUMDER ON 7/13/19 AT 7:32 PM REUTERS Excerpt: “If you are an Android user then you should know that it is vulnerable to malware attacks, which can cause serious data theft. Recently a new malware called ‘Agent Smith’ is targeting android phones to bombard with advertisements. As per the reports, this Agent Smith, which was first detected by IT security company Check Point, is also capable of targeting installed applications on android […]

Next Page »