Archive for the ‘Security Breach’ Category


iPhone and iPad Hacking Alert

You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now? Continue reading ‘iPhone and iPad Hacking Alert’

Security Breaches are Preventable

After security breaches, in order for the victim companies to feel better, executives are often led to believe that Continue reading ‘Security Breaches are Preventable’

Lenovo Computers Infected

Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo:

Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.

Hack the Hacker who Hacked You

Many times, organizations that got hacked want to track down and “hack the attacker back.” For instance, suppose someone emails your customers an email that says something bad about your organization. Most of the time, you’ll want to track those people down and do something about it! Continue reading ‘Hack the Hacker who Hacked You’

A Caller Says Your Computer Is Infected

Someone in your company receives a phone call, “This is Microsoft Technical Support. Your computer is infected with a virus.” They call back 50 more times after you tell them no. Continue reading ‘A Caller Says Your Computer Is Infected’

Did You Cause Your Own Dropbox Breach?

Hackers say they have 7 million Dropbox passwords. And testing of a sampling of them show that is true – but Dropbox adds that… Continue reading ‘Did You Cause Your Own Dropbox Breach?’

Shellshock: Check Your Web Server

Shellshock is a bug that may exist on your servers and even your Mac. Even if you use Windows in your office, your web server may use Apache on Linux. Continue reading ‘Shellshock: Check Your Web Server’

Reduce Your Risk of a Workplace Shooter

It happens too often: An employer terminates an employee, and then the employee comes back to shoot their supervisors. There is a simple way to reduce the likelihood… Continue reading ‘Reduce Your Risk of a Workplace Shooter’

What to Do About Your Passwords

You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies: Continue reading ‘What to Do About Your Passwords’

As if Heartbleed Wasn’t Enough, Here is Another Emergency:

Please forward this to your IT Techs immediately. As with Heartbleed, this is a vulnerability that attackers are already using against you and nobody knew until right now. These are called “zero-day attacks.” Continue reading ‘As if Heartbleed Wasn’t Enough, Here is Another Emergency:’