Security

Categories :
Tech support scams on the rise

Tech support scams on the rise

A typical technical support scam works like this: 1. A user receives a phone call, claiming to come from Microsoft or your ISP, claiming that a security problem has been found on their network or computer. One trick fraudster may use to gain a less technically savvy user’s confidence by tricking them into looking for error messages in Windows Event Viewer’s logs. In fact, such entries are completely harmless and should not be considered evidence of a malware infection. 2. The scammer tricks...

read more
Hacked Websites Report 2017

Hacked Websites Report 2017

The Hacked Website Trend report is a report produced by Sucuri. It summarizes the latest trends by bad actors, identifying the latest tactics, techniques, and rules (TTPs) seen by the Remediation Group (RG). This report will build on the data from the previous quarters, including updated data for 2017. The one constant you’ll find in this report is the issues pertaining to poorly managed or unmanaged websites. This report will give trends based on the CMS applications most affected by...

read more
Qustodio Review

Qustodio Review

  Qustodio seems like a popular choice for many parents due to marketing and the endless amounts of affiliate clickbait reviews.  Read my "honest" Qustodio review to find why you should NOT be using Qustodio for your parental controls. If your kids have multiple devices on different OS's (Apple, Android, Amazon, Windows, Mac, Linux), then parental control can be a real nightmare, as most apps are not available on all platforms.  For desktop security, I was using Microsoft Family Safety...

read more
Are you GDPR compliant?

Are you GDPR compliant?

The EU General Data Protection Regulation (GDPR) takes effect on 25th May 2018, so there is not much time left to take the appropriate steps to achieve GDPR compliance and review what you still need to do. Does the GDPR apply to me? The Regulation is huge in scope, unifying data protection laws across the EU. Its scale has led to many companies presuming that it only applies to companies that process large volumes of personal data. However, depending on a handful of factors, no matter what...

read more
Hit by ransomware? This free decryption tool for might help

Hit by ransomware? This free decryption tool for might help

Victims of one the newest - and most unusual - families of ransomware could now be able to recover their files without giving into the demands of criminals because decryption tools have been released for free. A GandCrab ransomware decryption tool has been released as part of the No More Ransom initiative, following a joint operation by Bitdefender, the Romanian Police, the Directorate for Investigating Organized Crime and Terrorism (DIICOT) and Europol. GandGrab first appeared in January and...

read more
The dangers of using public WiFi

The dangers of using public WiFi

How often do you use public WiFi? Are you aware of the dangers of using public WifI? Do you know how to protect yourself from harm? These are some of the questions that I will answer in this post, so if you or your kids are not currently securing your mobile devices, keep reading. The Dangers Of Using Public WiFi Everyone has several points during their day when they find themselves somewhere in public, and they just happen to catch a break. In those times, most people will simply take out...

read more
WordPress auto updates broken

WordPress auto updates broken

In an unfortunate turn of events, WordPress 4.9.3 was released earlier this week and it included a bug which broke WordPress auto-update. Millions of sites auto-updated from 4.9.2 to WordPress 4.9.3 and it broke their ability to auto-update in the future. What Broke? WordPress 4.9.3 included a bug that causes a fatal PHP error when WordPress tries to update itself. This interrupts the auto-update process and leaves the site on 4.9.3 forever. The core developers tried to reduce the number of...

read more
Major CPU security flaws affecting ALL computer systems

Major CPU security flaws affecting ALL computer systems

Meltdown and Spectre are the names of two serious security flaws that have been found within computer processors. They could allow hackers to steal sensitive data without users knowing, one of them affecting chips made as far back as 1995. What are Meltdown and Spectre? Meltdown is a security flaw that could allow hackers to bypass the hardware barrier between applications run by users and the computer’s core memory, which is normally highly protected. Spectre is slightly different. It...

read more
The Truth about WordPress Security

The Truth about WordPress Security

  One of the services I provide is managed WordPress websites, and a common negative comment I hear from people is about WordPress security, claiming “WordPress is not secure.”. More often than not these words of misplaced warning come from other web designers or IT guys who clearly have not done their research, and really should know better. The obvious major drawback of this information is that clients then become fearful of potentially falling victim to malicious behaviour.  But the...

read more
Security patches not being rolled out to Windows 7 & 8

Security patches not being rolled out to Windows 7 & 8

Microsoft is silently patching security bugs in Windows 10, and not immediately rolling out the same updates to Windows 7 and 8, potentially leaving hundreds of millions of computers at risk of attack. Flaws and other programming blunders that are exploitable by hackers and malware are being quietly cleaned up and fixed in the big Windows 10 releases – such as the Anniversary Update and the Creator's Update. But this vital repair work is only occurring slowly if at all, filtering back down to...

read more