Information Technology News & Information Uncategorized

Protecting Yourself This Holiday Season

While the holidays are a time for family and celebrating, that does not mean that scammers won’t try to spoil all that holiday cheer! With each year, the threats online have only increased, and it has become such a large issue for unsuspecting consumers that the US Department of Homeland Security Cybersecurity and Infrastructure Security […]

Information Technology News & Information

A Dangerous New Keylogger is on the Market

“Mass Logger,” a new keylogger on the market, has the potential to become extremely dangerous for businesses and individuals. Keyloggers are a type of malware, usually found within phishing campaigns, that store all information you type into your computer. These malicious programs can lead to many of your passwords becoming compromised. Why is This Key […]

Information Technology News & Information

New Ransomware on the Horizon: Tycoon

Windows and Linux users are once again the targets of a new string of ransomware: Tycoon. First discovered in 2019, the new strain of ransomware was created to attack educational institutes and software industries. Once inside, Tycoon proceeds to encrypt file servers, demanding a ransom for decryption. What makes this ransomware different from its predecessors […]

Information Technology News & Information

Cybersecurity News Bulletin

After the death of Iran’s General Qassem Solelmani, the United States may end up dealing with some serious cyber-attacks.  Since 1984, the United States has recognized Iran as a nation that supports terrorism and terrorist organizations, which has led to previous conflicts between the two nations. However, after the recent assassination of General Qassem Solelmani, […]

Information Technology News & Information

New Ransomware on the Rise!

New ransomware, Nemty, has been discovered according to the report from BleepingComputer. Nemty, as security researchers are calling it, has the possibility to spread using compromised Remote Desktop Protocol (RDP) connections. Nemty, like all other ransomware, holds the victim’s files hostage, deleting all shadow versions of the files while disabling the victim from any attempted […]

  • 1
  • 2