Quantcast
Browsing all 17 articles
Browse latest View live

Apple blocks vulnerable Flash plugins

Kudos to Apple. Last week they decided to start blocking vulnerable versions of Adobe Flash plugins from running in the built-in Safari web browser. This is in direct response to the active exploits in...

View Article


Anti-virus software alone is not enough

“Anti-virus software alone is not enough”… so says the number one antivirus provider Symantec in this post. A rather stunning admission I would say, and something many in the security industry have...

View Article


Oracle closes critical Java vulnerability

Oracle announced today the release of updates for Java versions 5, 6, and 7 to patch a critical java vulnerability actively being exploiting in the wild. The patches were reportedly slated for release...

View Article

Has the Pope been sued? Malware by Social Engineering

Has the Pope been sued? Apparently yes, if you believe the recent spate of emails floating around the intertubes. According to a Naked Security post yesterday, inboxes and spam filters are being...

View Article

Goodbye Windows XP

It’s nearly time to say goodbye Windows XP. This past April marked the one year count-down to the eventual discontinuation of support for the venerable operating system (technically on April 8, 2014)....

View Article


Trendjacking threats are a growing concern

I’m sure you’ve seen this, and I hope you haven’t fallen for it. Nevertheless, it must work because the bad guys keep doing it. The term is “Trendjacking”, and it refers to spammers and malware authors...

View Article

WordPress now offers automatic updates

There is welcome news for web developers this week as WordPress now offers automatic updates to the uber-popular web development platform. Starting out as a blogging tool, WordPress has morphed into a...

View Article

179 Reasons to Upgrade Before January 2014

As of this writing there are roughly four useable business weeks left in the current year.  As 2013 winds down, businesses should consider performing needed upgrades sooner rather than later. At the...

View Article


Defend Against the CryptoLocker Virus

The “CryptoLocker” virus has been making a great deal of noise lately. Though we at Thom Infotech have not personally encountered it, we know others who have. We’ve written this post to help you to...

View Article


Lessons learned from the Target PCI Breach

More information has been trickling out regarding the massive Target PCI breach that took place during the 2013 Christmas shopping season. Forensic researchers first learned that hackers penetrated...

View Article

It May Be Time to Outsource Your Computer Support

Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion. “prevention is better than cure” -Erasmus Setting up a small business computer network used to be...

View Article

Should you be worried about the latest Yahoo security breach?

Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be...

View Article

Support for Windows 7 is nearing the end

Windows 7 has been a very successful operating system since its release on October 22nd, 2009. Most users skipped over Windows 8 and Windows 8.1, finding Windows 7 to be trustworthy and reliable. But...

View Article


Do you really need to abandon Windows 7?

The warnings have been dire – YOU MUST UPGRADE TO WINDOWS 10! Is that really true? Are Microsoft, computer manufacturers, and computer resellers just making it all up? Let’s rewind a bit. Every...

View Article

The Modern Cybersecurity Framework – Introduction

The Cybersecurity Threat Landscape continues to grow more ominous by the day. The year 2021 was peppered with several high-profile breach incidents. Perhaps more significant was the dramatic uptick in...

View Article


Karakurt – A Disturbing Change in Ransomware Tactics

For years, businesses and IT service companies have done battle with hackers in the burgeoning business of crypto-locking data and extorting the affected companies and individuals to regain access to...

View Article

How the MITRE ATT&CK Framework Uses Reconnaissance to Plan & Carry Out Attacks

  Our opening post in this series introduced our readers to the Modern Cybersecurity Framework. While the threat landscape is clearly dangerous, efforts to understand and adapt to the hazards are...

View Article

Browsing all 17 articles
Browse latest View live