by bct2mastertemp | May 25, 2022 | Blog
Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Despite years of training, re-training, and near-constant reminders to strengthen passwords,...
by bct2mastertemp | May 24, 2022 | Blog
Some interesting and disturbing changes are afoot in the hacking world. It appears that the TrickBot gang is now working for the Conti Syndicate. TrickBot is a well-known group of botnet developers responsible for the creation of the BazarLoader. BazarLoader has been...
by bct2mastertemp | May 23, 2022 | Blog
There’s a big change coming to the Microsoft Edge browser. Big enough that it may prompt some users to switch to Edge. Recently, Microsoft announced that they’ll be adding a free built-in VPN (Virtual Private Network) service to Edge as part of a...
by bct2mastertemp | May 21, 2022 | Blog
How many “smart” devices do you have connected to your home or company network? It’s probably a higher number than you originally estimated. However large that number is, it pays to be aware that IoT devices are some of the least secure devices...
by bct2mastertemp | May 20, 2022 | Blog
Researchers at Bitdefender have discovered a new malware campaign. This one uses an attack method that has fallen out of favor in recent months, called the Exploit Kit. Exploit Kits used to be all the rage. Flash Player was a popular target for Exploit Kit based...
by bct2mastertemp | May 19, 2022 | Blog
A handy new Google Assistant is coming soon to a device near you. The new feature is designed to automate the frustrating and often time-consuming task of changing your passwords after a breach. This information is according to a tweet from Max Weinbach and a...