Our Blog Archives

by | Jul 1, 2014 | 0 comments

Virtualized Calls a Top Threat for ATO Attacks

According to the 2019 State of the Call Center Authentication report from TRUSTID, a Neustar company, one of the most exploited areas in a company’s security chain is the call center. Companies may be investing more in their cybersecurity defenses, but fraudsters are...

Kaspersky Lab Files Antitrust Case Against Apple

Kaspersky Lab has filed an antitrust complaint against Apple in Russia, arguing that the tech giant forced it to remove two key features from one of its apps just as Apple’s released similar functionality. The issue boils down to Kaspersky Lab’s use of configuration...

Alex Kipman’s Holographic Tendencies

Microsoft's second-generation mixed reality headset has made a significant leap. But you're probably not going to buy one. That’s according to Alex Kipman, technical fellow at Microsoft who is credited with inventing Kinect and HoloLens. Kipman joins the Gadget Lab...

Consumers Donate Data with Recycled Electronics

Consumers Donate Data with Recycled Electronics With the rapid turnover of technology, many consumers willingly trade in, sell or donate their old electronics, often times without ensuring that all of their data has been wiped clean, according to new findings from...

Aluminum Giant Norsk Hydro Suffers Major Cyber-Attack

One of the world’s biggest aluminium producers has been hit by a major cyber-attack affecting production systems, according to reports. Norwegian firm, Norsk Hydro, said it had called in national security authorities to help repel the attack, which appears to have...

Denial of Service Attacks

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. 2018, an average number DDoS attacks registered against targets in approximately 80 countries; Over 95% occurred in...

Important Alert: NEW Office 365 Phishing Threat

A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case,...

A New SamSam Ransomware Alert Issued

The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) - just days after two mastermind suspects were charged by US Department of Justice. The...

Ransomware – Still Alive and Kicking

If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a...

Sextortion: what you should know of this new email scam

Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...

Sextortion: what you should know of this new email scam

Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...

Top-Clicked Phishing Email Subjects

Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please - the top 10 are: Password Check Required...

What to Do About C-Level Fraud Attacks

C-level fraud attacks are an increasingly common attack vector, especially for SMBs. Generally, these attacks come in the form of spoofed emails from the “CEO” or another C-suite executive and ask the recipient to wire role power (people tend to do what the boss says)...

.

Copyright © 2019 powersolution.com. All rights reserved.