Security Archives - Hungerford Technologies

Security

Adobe Released a Mega Update That Patches More Than 100 Security Vulnerabilities

In July 2018, Adobe released a major update that patches 112 vulnerabilities in five popular Adobe apps. These programs run on a variety of platforms, including Windows, macOS, and Chrome OS. The vast majority of vulnerabilities (104) were found in Adobe Acrobat and Acrobat Reader for Windows and macOS. If exploited, the vulnerabilities could lead to sensitive […]

The 5 Most Costly Types of IT-Related Cybercrimes

In May 2018, the Internet Crime Complaint Center (IC3) released its “2017 Internet Crime Report“. The IC3, which is part of the US Federal Bureau of Investigation (FBI), was established to gather complaints from victims of Internet crime. In 2017, an average of 826 complaints per day were received from victims. The complaints reveal that […]

How to Set Up Two-Step Verification for Your LinkedIn Account

Many business professionals use LinkedIn to promote their businesses as well as connect with colleagues. It is especially popular among small business owners since there is no fee for setting up a basic LinkedIn page. However, LinkedIn has been the target of many cyberattacks, with the most serious one being the 2012 data breach of 117 […]

How Former Employees Can Pose a Big Threat to Your Data

Data breaches by former employees do not gain as much media exposure as those caused by cybercriminals. However, these attacks can pose a significant threat to companies’ data. Which also effects their bottom line too, as the following examples demonstrate: Over a two-year period, the co-owner of an engineering firm accessed the servers of his […]

What You Need to Know About Spectre and Meltdown Vulnerabilities

You likely have seen the news about the recent CPU (processor) security exploits in the news, and may be worried. The Spectre and Meltdown vulnerabilities , which were revealed Wednesday, could theoretically let attackers capture information they shouldn’t be able to access. Researchers found two major weaknesses in processors that could let attackers read sensitive […]

This Tech Support Scam Can Trick You into Calling a Fake Hotline

Tech support scams have been around for years, but their perpetrators have added a new twist. In addition to calling, they are now sending phishing emails. Find out how the phishing-based scam works and how to protect your business against this threat. Your phone rings. As soon as you say “Hello”, the caller identifies himself […]

What you need to know about the KRACK WiFi Security Exploit

Many of you likely have seen the news about the recent WiFi wireless security exploits in the news, and may be worried. While this vulnerability presents a risk to any sized business, it is important to remember that a hacker would need to be in the physical proximity of your wireless signal for an extended […]

Cybercriminals Are Creating Fake Banking Websites That Look Like the Real Deal

Banking trojans have been around for years. If your computer is infected, the trojan waits until you visit your online banking website. When you do, it redirects you to a malicious website that looks like your bank’s site. If you enter your banking credentials, they will fall into a cybercriminal’s hands.In the past, you could […]

Multi-Factor Authentication: The Secret to Enhancing Security in Microsoft Office 365

Microsoft Office 365 is a cloud-powered version of Microsoft Office. In addition to the standard features, this new version of Office now offers online conferencing, file sharing, business-level email, shared calendars, and website creation. Placing data in the cloud introduces risks such as data breaches, data loss, account hijacking, and more. Microsoft acknowledges these issues, […]

How to Create Strong Passwords

Many websites and online services have users sign in to their account with an email address-based username. While this makes it easier for people to remember their login information, it also makes it easier for hackers to gain access to users’ accounts. And when this login information contains weak passwords, hacking into the accounts becomes […]