by Miguel Morales | Aug 4, 2020 | IT Support
In a perfect world, someone would notify you as soon as it discovers a vulnerability in your system… But zero-day exploits happen in real life. Instead, hackers approach it silently. Doesn’t matter how safe and protected you think you are… The perseverance of...
by Miguel Morales | Aug 3, 2020 | IT Support
Consider the enormous damage a hacker can do with one computer. Now multiply that with the power of thousands, or millions of slave computers (botnets). As crazy as it sounds, these cyber zombie hordes exist. Hackers can use botnets to carry out DDoS attacks,...
by Miguel Morales | Jul 31, 2020 | IT Support
We have all heard about major targeted attacks. The attacks on Sony and Ashley Madison made international news and are still fresh on our minds. When they’re targeted, they’re even more dangerous. When hackers exposed the intimate details of over 30 million adults,...
by Miguel Morales | Jul 30, 2020 | IT Support
Elon Musk, Bill Gates, and Barack Obama are some of the many influential figures Hackers targeted on Twitter in a Bitcoin scam. The accounts of Kanye West, Joe Biden, and Jeff Bezos were also hacked, posting cryptocurrency donations requests. “Everyone is asking...
by Miguel Morales | Jul 29, 2020 | IT Support
China’s telecom giant Huawei is in deep trouble. The FCC has officially declared it a national security threat, and the U.S. is persuading allies to follow suit. Several major companies like Google, Microsoft, and chip designer ARM have already cut off ties. The...
by Miguel Morales | Jul 28, 2020 | IT Support
These days, hackers don’t even need malware to steal from companies. They simply use social engineering methods like spoofing and pharming to target a company’s weakest links – its employees. These methods are much easier for adversaries and can net them a...