Check out the latest business IT News.

Use Google Chrome? New Font Not Found Message Potentially Malware

By developer / March 2, 2017

There’s a nasty new form of Malware making the rounds that targets Chrome users, so if that’s your browser of choice, be warned that if you’re not careful, you could wind up with a lot more than you bargained for. Here’s how the new attack works: If you go to a website that doesn’t display…

Read More

Amazon Cloud Goes Down, Causes Outages Across The Internet

By developer / March 1, 2017

In recent years, an increasing number of companies have migrated to the Cloud for cost-saving reasons, but today, we got a painful reminder of the limitations and risks associated with doing that. Amazon’s cloud-based service, AWS, suffered an outage that is impacting a number of people who rely on the service, including, but not limited…

Read More

Music Festival Coachella Attendee List Hacked, Including Passwords

By developer / February 28, 2017

If you’re a music lover and you’ve been to the website of the annual California music festival Coachella, then you are at risk. The entire Coachella database was recently found for sale on the Darkweb. It contains email addresses, passwords and in many cases, IP addresses and other personal information of everyone who has registered…

Read More

Websites Are Being Attacked – Time For A Security Update

By developer / February 27, 2017

WordPress is the reigning King of the Content Management Systems, and by extension, the king of much of the internet. More people use the platform than any other, and with good reason. It’s an enormously flexible platform that will allow you to build any kind of website you want with ease. With creative use of…

Read More

Macs Finally Experience Malware From New Office for Mac Macro Target

By developer / February 25, 2017

It’s an oldie but a goodie, and an attack vector that Windows users have seen since the late 90’s. Macros. These are essentially shortcut codes that Microsoft Word and other applications use to automate certain processes. They’re written in Visual Basic, and unfortunately, in addition to making your life easier in MS Office, they can…

Read More

Gmail No Longer Supports Windows XP, Vista

By developer / February 24, 2017

If, for some reason, you’re still running Windows XP or Vista , you probably already know that it’s well past time to upgrade. Microsoft officially ended support months ago, even for critical updates, which means that your computer is essentially a ticking bomb. Sooner or later, a hacker is going to find it, and when…

Read More

Nokia Phones Might Be Back With New Smart Devices

By developer / February 23, 2017

Remember back in the early 2000’s when Nokia was the king of the cellphone market? Well, if you’re feeling nostalgic for those days, there’s (potentially) good news on the horizon. At a recent tech conference in China, the Finnish company announced the release of the “NSeries.” The NSeries is a new generation of smartphones that…

Read More

Is Your Money Safe? Bank Cyberattacks On The Rise

By developer / February 22, 2017

Kaspersky Labs originally discovered “fileless malware” back in 2014, but it wasn’t until this year that it became mainstream. Now, the company is reporting that more than 150 banks around the world may be infected. The problem with this kind of attack is that, as the name implies, it does not rely on files being…

Read More

Did Your Printer Receive A Message From A Hacker?

By developer / February 21, 2017

Over the weekend, a hacker who goes by the name Stackoverflowin performed a public service. Of course, in the process of doing so, he terrified and confused a lot of people. Having researched a printer vulnerability, he wanted to help get the word out and have a little fun at the same time. So, he…

Read More

SVG Images Getting Wider Distribution As Malicious File Type

By developer / February 20, 2017

JavaScript is hands down the tool of choice of hackers who are interested in inserting malicious code onto a user’s device. Most commonly, scripts are embedded in compressed (zipped) files, and when unpacked, install on the user’s machine without him or her even being aware of what’s going on. The problem has reached such epic…

Read More