Blogs

Categories

Secure Boot Bypass Puts Countless Devices at Risk

Posted by Norma Stratton on

Secure Boot Bypass Puts Countless Devices at Risk

Whatever else you can say about cyberattackers, they are an innovative bunch and are always quick to pounce on any potential weakness. Unfortunately, the “BootHole” bug has given them a new opportunity to target billions of devices to load malware, access sensitive information, and much more. The bug in question is in the GRand Unified Bootloader version 2, referred to as GRUB2. For most computer systems, GRUB2 is the default loader and manages part of the system’s start-up process by either presenting a menu requiring input from the user, or by transferring control to an operating system kernel. When starting...

Read more →

Your Router Could Be a Linux Security Risk

Posted by Norma Stratton on

Your Router Could Be a Linux Security Risk

Your Router Could Be a Linux Security Risk We all want to be confident that our networks are secure, but it might come as a surprise that the biggest threat to your security might actually be your router. A recently published report has revealed that many popular home routers possess a number of vulnerabilities that create weak points in your network security. Many these routers never receive firmware updates over the course of their lifetime, leaving you vulnerable to hundreds of known security issues. These gaps in your security can lead to compromises of personal information, which in turn can lead to...

Read more →

The New Malware That Can Steal Passwords and Card Data

Posted by Norma Stratton on

The New Malware That Can Steal Passwords and Card Data

There’s a new malware strain in town, and it definitely deserves your attention. Known as BlackRock, this Android malware is based on the leaked source code of the Xerxes malware and can target 337 apps, including email, media, and banking apps. BlackRock works in the same manner as most Android malware. It can perform overlay attacks and is able to send, spam, and steal SMS messages. It can also lock victims in the home screen, hide or steal notifications, and deflect antivirus software. While this is similar in function to other Android banking Trojans, the key difference with BlackRock is...

Read more →

Uninstall These Apps That Google has Removed from the Play Store

Posted by Norma Stratton on

Uninstall These Apps That Google has Removed from the Play Store

Uninstall These Apps That Google has Removed from the Play Store Malware is in the news again with both the arrival of BlackRock, which is known to affect 337 apps, and with Google removing 11 infected apps from the Play Store. Each of these apps were found to be infected with the Joker malware, a Trojan that activates when the user interacts with it, often in the form of installing an app. The virus slips past the device’s security to steal information, or even cripple the device. Joker was first discovered in 2017 and is one of the most widespread...

Read more →

Remote Work Makes Cybersecurity More Important Than Ever

Posted by Norma Stratton on

The New Normal of Remote Work Makes Cybersecurity Basics More Important Than Ever

The New Normal of Remote Work Makes Cybersecurity Basics More Important Than Ever The past several months have brought about a number of changes, not the least of which is the number of people who have begun to work from home. While this brings certain benefits for both employers and employees, it also points to the fact that cybersecurity and the protection of sensitive data is more important than it has ever been. In March of this year, large numbers of employees began working remotely, often bringing corporate devices home with them to enable them to do their jobs from...

Read more →