Microsoft Allowing More Time For Major Windows 10 Updates

Microsoft has been making two major Windows 10 releases every year, giving businesses 18 months before they need to move to the next update. This plan and schedule is part of the company’s “Windows as a service” paradigm, designed to ensure that Windows 10 gets new features, as opposed to …

Amazon Joins Trillion Dollar Club

It’s official, Apple now has company in the Trillion Dollar Club as Amazon’s stock surged past $2,000, briefly pushing the company’s total value to just over the trillion-dollar mark. This makes the company’s CEO Jeff Bezos the richest person in the world, with a net worth estimated at around $166 …

Name Of Utility Company That Leaked Information Just Released

In 2016, an unnamed US energy company left some 30,000 records (containing information about its security assets) exposed for more than two months (a total of 70 days), in violation of energy sector cyber security regulations. When the incident was initially reported, the name of the company was withheld. That …

Tech Support Scammers Are Advertising Online 

Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …

Air Canada Customers May Have Had Their Data Exposed 

If you fly Air Canada and use their mobile app, it may be time to change your password. The company recently announced that between August 22nd and August 24th of this year, they detected “unusual log-in behavior,” and that a small fraction (some 20,000) of their 1.7 mobile app users …

Hacker Requests For Wire Transfers Are Topping Email Scams

Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …

New Versions Of Ransomware Continue To Wreak Havoc

2017 was “The Year of Ransomware.” It saw an incredible number of ransomware attacks and infections, paired with a tremendous number of innovations. Although 2018 hasn’t seen quite the same level of ransomware activity, it’s still a major threat with one company coming under attack about every ten minutes. Although …

Some Apple iPhone 8’s May Have A Manufacturer Defect

Do you own an iPhone 8? If so, you may have problems. Apple has recently reported that a small percentage of iPhone 8s “contain logic boards with a manufacturing defect. Affected devices may experience unexpected restarts, a frozen screen, or won’t turn on.” The company has isolated the defect to …

Most Small Businesses Can’t Recover From Cyber Breaches

A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …

Vulnerability Found In Major Manufacturers Of Android Phones 

Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you’re not sure what an “AT Command” …