Category: Tech News
-
Web Browsers implementation of DNS over HTTPS TLS
Immediately after Mozilla announced its plan to soon enable ‘DNS over HTTPS’ (DoH) by default for Firefox users in the United States, Google today says it is planning an experiment with the privacy-focused technology in its upcoming Chrome 78. Under development since 2017, ‘DNS over HTTPS’ performs DNS lookups—finding the server IP address of a […]
-
Step by step guide to repair damage from McAfee Intel VirusScan Enterprise 9226 Dat
On April 13th 2019 McAfee and Intel release a definition update DAT Version 9226 and another one on April 14 DAT Version 9227 and they did a lot of damage very quickly to many computers. If you look at your Quarantine Manager you will find numerous entries for RDN/ScreenConnect. When you right click these and […]
-
Using Compromised Passwords and information
Lots of changes are happening all around us on a daily basis when it comes to today’s technological conveniences. Many of us do not have an interest in news about businesses that have become compromised or sometimes even government agencies. This list of organizations is incredibly long and has a direct effect on billions of […]
-
Is your staff equipped to use company email without being a threat?
Is your staff equipped to use company email without being a threat? Google subsidiary Jigsaw recently put that question to many of us through this simple online simulation quiz. We highly recommend if your company is not enrolled in any Phishing education programs to encourage your staff to take this simple, safe and fast quiz […]
-
New malware found using Google Drive as its command-and-control server
Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities. Cybersecurity researchers have now spotted a new malware attack campaign linked to the notorious DarkHydrus APT group that uses Google Drive as […]
-
Malware Gets Commands From Memes Posted On Twitter
Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services. Trend Micro researchers have uncovered a new piece of malware that retrieves commands from memes posted on a Twitter account controlled by the attackers. Most malware relies on communication with their command-and-control server […]