May 23rd, 2019 | By Administrator
Point-of-Sale (POS) systems attract hackers due to the significant rich source of financial gains they can possibly achieve. Some hackers found ways to successfully exploit a POS firm that further targeted over 130 locations. A POS firm based out in Minnesota suffered a cybe...
MORE
May 15th, 2019 | By Administrator
There was a time when 56kbps modems were the trend in technology. Using these old school modems refers to dial-up connections. Remember how slow the internet connection at that time? You get the same experience when you fall victim to RUDY’s attack. RUDY is an acronym that s...
MORE
May 13th, 2019 | By Administrator
Data is a critical resource for businesses of any size; it is therefore vital to strengthen data security. Data is transferred across multiple channels through the internet and becomes vulnerable to online data breaches. Data Security is critical to ensure protection of impo...
MORE
May 4th, 2019 | By Administrator
Distributed Denial of Service in short is commonly called DDoS. This is a type of cyberattack that weaves in a combination of sophisticated and dynamic attack methods to evade internet-facing devices. It attempts to load the normal traffic of the victim server or business ne...
MORE
May 2nd, 2019 | By Administrator
An Introduction To Zero day Vulnerability Stuxnet is a computer worm that affected the computers in Iran’s nuclear plant Natanz back in 2010. This malware exploited a zero day vulnerability in Windows at that time. It affected computers controlling the centrifuges of the nuc...
MORE
April 15th, 2019 | By Administrator
Point Of Sale Security Guide Introduction North Country Business Products, Inc. was a recent target of a cyber attack according to Fox 10 news. Their business partners fell victim to a data breach. The attack started between January 3 and January 24, 2019. The attack stole t...
MORE
April 8th, 2019 | By Administrator
Introduction What do BlackPOS, Backoff, and Bernhard POS have something in common? They are all notorious POS malware. So how does malware work? POS malware will scan for active processes in your computer’s memory or RAM. It will then scrape or extract information out of the...
MORE
April 3rd, 2019 | By Administrator
Introduction In today’s business setup, you can see people bringing their own electronic devices at work. People use their own laptops, tablets, and smartphones to do work. This is what a BYOD or “Bring Your Own Device” environment looks like. This kind of work environment i...
MORE
April 1st, 2019 | By Administrator
The Benefits Of Application Whitelisting Introduction Have you ever been in an event where you can’t enter because your name is not on the list of participants? You forgot to register in your excitement to attend this event. This scenario is very similar in conce...
MORE
March 27th, 2019 | By Administrator
Introduction There are times that you can’t access some websites in your web browser. You also can’t access some applications at work. What you can only access are the ones provided on your desktop. A whitelisting software put these restrictions in place. To protect your net...
MORE