10/09/2017
The hurricane survival guide for today's businesses

Depending where your business is located, the risk attached natural disasters can vary. To help, here is a survival reference guide to ensure your business can weather any storm. Since it is hurricane season, let's use hurricanes as a point of reference for this guide. Hurricanes and tropical storms wreak havoc through a combination of […]

Read More
09/15/2017
Equifax poised for another Equifax security breach due to insecure database credentials

Researchers from US firm Hold Security investigating Equifax after the recent Equifax security breach exposing details of 143 million customers have said its Argentine arm is also easily hackable. It appears Equifax security measures are nothing but sloppy after revelations that its Argentinian database has 'admin' as both the username and password. An employee portal, […]

Read More
08/31/2017
A Canadian university lost $9.5M in an online phishing scam

A Canadian university says staffers unwittingly lost $9.5m (C$11.8m; £7.5m) in an online phishing scam. Phishing emails convinced staff at MacEwan University that a client was changing its bank account details. The staff then paid money into the fraudulent account. Since the online phishing scam, the university, located in Alberta, Canada, is auditing its business […]

Read More
08/21/2017
Cyber criminals target victims by making them install Chrome extensions

In these recent attacks cyber criminals target victims using social media networks, specifically those individuals inside financial organizations and those who make financial transactions. These victims were then called using the phone by the attacker posing as bank employees, who then used social engineering tactics to trick the victim to install an "update" to the bank’s […]

Read More
08/01/2017
Is an effective business web site more than just a pretty face?

Properly positioning your company on the web is a critical step to acquiring new customers or engaging new users. Whether you have a free movie website, a church website, or a small business web site, it is a fact that most people cannot help but judge a company or service they find on the web […]

Read More
07/31/2017
Hackers target users of Copyfish, a Chrome extension, to show Adware

As in previous example of ransomware attacks, cybercriminals usually go straight for the end users. There are times however, they take a less direct approach, as they did with an adware campaign that targeted Google Chrome users. Copyfish is a translation plug-in for Google Chrome. By no means is it one of the most used […]

Read More
07/26/2017
Data breaches are up 29 percent over last year

According to a report released by the Identity Theft Resource Center and CyberScout, data breaches are running 29% above last year. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. Although two-thirds of data breach notifications or public notices did not report the number of records compromised, more than 12 […]

Read More
07/17/2017
Two more Cybercrime-as-a-Service Platforms Discovered

With the rise in dependability on technology and on the internet, cybercrime is also on the rise. To meet the demand, there is a rising trend of social engineering sites on the dark web, which make malicious hacking a point-and-click exercise. You read correctly, you can now pay for a service to help you commit […]

Read More
07/10/2017
Businesses must learn to combat cyber attacks

After two recent ransomware cyber attacks disrupted businesses, factories, hospitals and schools in over 150 countries, there are many lessons to be learned. The WannaCry ransomware was developed to take control of system data. It encrypted files as soon as the virus became active and demanded a ransom to be paid via Bitcoin, a cryptocurrency […]

Read More
06/28/2017
GoldenEye / Petya ransomware triggers massive attack worldwide

A massive attack, triggered by a version of the GoldenEye or Petya ransomware is currently claiming victims around the world. Unlike other families of ransomware, #GoldenEye does not encrypt individual files, but rather the entire hard disk drive. It then reboots it to prevent the user from accessing that information. When the encryption process is complete, […]

Read More
Copyright © 2021 QWERTY CONCEPTS, Inc   |   All Rights Reserved   |   Sitemap   |   Managed IT services provider for New Jersey and New York City businesses
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram