There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
SpireTech Company News and Tips
Security
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
Biometrics: How Do They Work? Are They Safe?
used with permission from Norton by Symantec, by Nadia Kovacs Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login...
Safe Online Shopping For The Holiday Season
used with permission from Norton by Symantec, by Nadia Kovacs The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic, especially during Black Friday and Cyber Monday. Sometimes it...
Ransomware: 5 Do’s And Don’ts
used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Government warns IT professionals about Cybercrime
We've had the privilege over the last couple of months to attend a couple of IT and tech industry conferences. The NSA, FBI, and Homeland Security had speakers at these conferences and they are sending a message: US Businesses are the target of...
The best way to prepare for disasters and security breaches
used with permission from HP Technology at Work What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is...
Use Location Services More Safely
used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you've used your phone to find directions or locate a nearby restaurant, you've used its global positioning system (GPS) and it's likely that it would be...