(866) 695-2175 | Experiencing an IT Emergency?
Blog
March 21, 2020 by Vertical Axion
Google has recently rolled out a small but important change to its Chrome browser for Windows, Linux and macOS users. The most recent update adds a ‘Default to Guest mode’ to the browser that can be enabled via Enterprise policy or a simple command-line switch. When the new feature is enabled, any time a browser […]
Read more »
Tagged
March 20, 2020 by Vertical Axion
Remember the Rowhammer vulnerability that made headlines around the world last year? 2019 saw all sorts of unusual threats, so if you’re struggling to recall the details of that one in particular, here’s a quick review: Any time a modern RAM card handles data, it is saved in memory cells that are arranged in a […]
March 19, 2020 by Vertical Axion
Are you a Walgreens customer? Do you make use of the company’s mobile app, available for both Android and iOS devices? If so, be advised that the company recently disclosed a serious flaw in the app that inadvertently leaked both Personally Identifiable Information (PII) and Personal Health Information (PHI). The information was in the form […]
March 17, 2020 by Vertical Axion
Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was hacked. The notice said that the hack exposed the financial and personal information of a small fraction of the company’s customers. In addition […]
March 16, 2020 by Vertical Axion
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on their guard against them. Naturally, this prompts scammers to change their tactics, switching things up a bit to catch people by surprise. In […]
March 14, 2020 by Vertical Axion
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year (2020). When targeted by this attack, a user will get an email containing a braded document containing the name of a legitimate cybersecurity […]
March 13, 2020 by Vertical Axion
Unless you’re plugged into the world of social media, you may not realize it. There’s a war on, and until recently, it was a war that Facebook was losing. The war is being fought with billions of fake accounts being used to fundamentally alter the social media landscape. It is influencing the kinds of content […]
March 12, 2020 by Vertical Axion
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential stuffing attack to breach one of the company’s databases and accessed some of its customer account data. Credential stuffing, as you may know, […]
March 11, 2020 by Vertical Axion
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online accounts as a two-factor authentication layer. Google launched the service as an alternative to SMS-based one-time pass codes. While SMS-based codes […]
March 9, 2020 by Vertical Axion
Photos are a new kind of currency, and gaining in value. Clearview AI is a facial recognition startup used by hundreds of law enforcement agencies around the country. The company was hacked, giving the hackers access to literally billions of photographs. In addition to the images themselves, the hackers gained access to Clearview’s customer list. […]
March 6, 2020 by Vertical Axion
Nemty Ransomware isn’t an especially well-known threat, but it’s dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that’s attempting to spread the ransomware far and wide. An unknown group of hackers are sending out what appear to be love letters from secret admirers in a broad pattern. They […]
March 4, 2020 by Vertical Axion
It’s tax season, and if you’re like many people, you make use of one of the numerous e-file platforms offered by TurboTax, TaxAct, and similar companies. Unfortunately, tax season also presents a tremendous opportunity for hackers. So much that the IRS has issued a formal warning to accountants and taxpayers alike, urging them to enable […]
February 29, 2020 by Vertical Axion
Finally, a smart device manufacturer is taking device security seriously, and that’s great news indeed. You may recall reading about a serious issue with Ring security systems recently. The news was that the security issue allowed hackers to commandeer user systems and spy on them. The hackers were sending the users messages and making disturbing […]