Author Archive

Is Your Data Being Sold to Marketers by Your Antivirus Software Company?

Friday, January 31st, 2020

“Nothing in life is free.” A lot of people use Avast’s antivirus to protect their computer.  It costs you nothing out of pocket and it’s a pretty effective little cybersecurity tool. Sound to good to be true right? That’s because it is. Did you know that, by default, Avast not only collects your browser activity, […]

United Nations Hack and Cover-Up

Friday, January 31st, 2020

Not only has it been leaked that the UN was hacked, but there’s also evidence suggesting they tried to cover it up. What We Know According to a confidential internal document that was leaked to The New Humanitarian and shared with the  Associated Press (AP), more than 40 servers in Geneva and Vienna were compromised.  […]

Hackers Have Started Ransoming Patient Data… to the Patients

Wednesday, January 22nd, 2020

As if having your medical data compromised wasn’t bad enough… Now your medical secrets are being held hostage! It’s a breezy but sunny afternoon.  You’re going about your day, minding your own business when you receive a random text message from an unknown number saying that they have personal medical information about you that they will […]

Was Your Data Compromised by Equifax? Better Act Fast!

Friday, January 17th, 2020

Two billion dollars sure does sound like a lot of money for a class action lawsuit, but when you are a major credit reporting agency whose negligence compromised over 147 million people’s personal information? It’s really not.  Click here to file a claim free, online, if you were a potential victim of the massive Equifax […]

Authenticate Your Google Account With Your iPhone

Thursday, January 16th, 2020

Among all the security features available today, two-factor authentication (2FA) is by far one of the most important, and apparently, Google is aware of that!  In their most recent iOS “Smart Lock” app update, they included a feature that will allow you to use your iPhone as a physical 2FA device.  After you set it […]

Microsoft’s Comprehensive End of Support List for 2020

Tuesday, January 14th, 2020

I know you are all aware of what I’m about to tell you, but just in case you momentarily forgot, I’m going to refresh your memory… Every year, Microsoft stops supporting select versions of its software.  What this means is that they discontinue any sort of security updates or patches.   What does this mean for […]

Just How Not “HIPAA Mandatory” Is Encryption?

Wednesday, January 8th, 2020

In case you were ever wondering if your practice needs to encrypt its ePHI? Let the $3 million HIPAA penalty paid last month by the University of Rochester Medical Center (URMC), one of the largest medical systems in NY State, serve as a warning. The Department of Health and Human Services’ Office for Civil Rights […]

FBI Warns Business Owners: Beware of Increasing Maze Attacks

Wednesday, January 8th, 2020

Directly on the heels of LockerGoga and MegaCortex, a different strand of ransomware, Maze, which was first discovered nearly a year ago, started to target private companies in the US in November, and the FBI wants to make sure you know about it. Just two days after issuing an alert for LockerGoga and MegaCortex, the […]

Twitter Vulnerability Exposed in a Big Way

Thursday, December 26th, 2019

Ibrahim Balic, a security researcher, recently exposed a flaw in Twitter’s app that allowed to match unique Twitter user accounts with 17 million phone numbers months ago.  He was able to accomplish this by uploading large lists of phone numbers by way of Twitter’s “Contacts Upload” feature that is available on the social media giant’s […]

Ransomware Attack Shuts Down New Orleans

Saturday, December 14th, 2019

It seems like something that only happens in movies and TV shows: It’s Friday the 13th.  You, your colleagues, your entire department, the entire city, in fact, receives the same command to power down their computers immediately and disconnect all devices from the network. But this wasn’t a movie and it wasn’t a TV show… […]

Sentara Doubled Down When They Should Have Folded

Tuesday, December 10th, 2019

“Eight is Enough” A great, wholesome, family show from the late 70’s and early 80’s.  Also: what Sentara Hospital, with over 300 facilities across the states of North Carolina and Virginia, is telling the Department of Health and Human Services’ Office for Civil Rights (OCR) after being on the receiving end last month of this […]

Russian Hackers Hold Nursing Home Patients’ Data Ransom for $14M

Monday, December 9th, 2019

There is a reason hackers have started targeting hospitals and medical practices.  Not only is their cyber security known to be woefully lacking (despite the best efforts of the U.S. Department of Health and Human Services [HHS] and HIPAA regulations), but the electric Patient Health Information (ePHI) can literally be life and death.  Meaning?  The […]

Security Alert: Your Website Might Display This Warning Starting July 2018

Friday, July 6th, 2018

In July 2018, Google will publish release 68 of its Chrome web browser. Unlike prior releases of Chrome, this version can significantly affect your website traffic and possibly affect your company’s reputation. Chrome 68 will include a security check to detect whether your website is encrypted. If it is not, Chrome will immediately display a […]

Hackers for Hire

Thursday, October 1st, 2015

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Need info about your business competitors?  Revenge on a cheating ex?  Everyone from jilted lovers to law firms has hired freelance hackers. The […]

Five Tips for Keep Hackers Out of Your Home

Thursday, October 1st, 2015

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text] As much as we hear about the major cyberattacks against large corporations and even governments, the majority of cyberattacks are carried out […]

Hilton Hacked

Thursday, October 1st, 2015

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Hilton appears to be the most recent victim of POS malware responsible for stealing the credit card of information of customers.  In this […]

Adobe Updates and the Case Again Shockwave

Thursday, October 1st, 2015

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Adobe released an update yesterday to patch over 20 security vulnerabilities.  And Shockwave still isn’t up to snuff. The nearly two dozen patches […]

Verizon Out in RDU

Thursday, October 1st, 2015

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Verizon customers are experiencing a service outage in the Raleigh-Durham area late Monday afternoon, with the outage starting around 2:45 PM. Verizon confirmed […]

Lenovo cuts include 230 people in Triangle

Friday, August 14th, 2015

Two-time IT author and professional in the field of cyber security, Craig Petronella, has announced methods that he feels can be used to take action against cyber thieves. Craig Petronella has 23 years of experience in this field and computer security. Some of his tips for consumers include advising against credit card use over the […]

Cybersecurity proves to be a necessity for owner of Durham’s Cocoa Cinnamon

Monday, July 27th, 2015

“That is how I found out the bots were constantly trying to sign in,” he said. “I get four notifications a day saying somebody tried to sign in to your website.” That situation is actually quite common, said Craig Petronella, president of Petronella Technology Group in Raleigh. There are black market programs that search for […]