Malware and Virus Protection Tag

Did you know that over 90% of all cyberattacks start with an email?  That’s right, most successful cyberattacks start with someone simply clicking a link in an email. Additionally, approximately 306.4 billion emails are sent every day! Email remains one of the most used methods of communication, particularly for businesses. In 2021 Phishing and pretexting made up a whopping 93% of all...

If you can't trust your friends, who can you trust? No one, apparently. There's a new scam on Facebook that's making waves, and it's one you should be mindful of. You may get an "urgent message" from someone you know, asking for your help in recovering their Facebook account. This is a tried and true phishing scam, relying on some basic psychology. After...

Hackers around the world are continuing to innovate at a terrifying, relentless pace, and that truth is reflected in the latest form of ransomware to be found in the wild. Dubbed "DoubleLocker," this new strain targets Android devices. It uses and abuses the platform's Accessibility Service, reactivating itself every time the user presses the phone's "Home" button. Initial forensic analysis of the...

Companies are getting better at detecting and fending off brute force attacks. Depending on how big, and how hard-hitting the attack is, it can still get through, of course, but the main problem with such an attack is that it’s impossible to miss. The moment it starts, security professionals know what’s going on, and can immediately spring into action. Of course,...

Recently, we wrote an urgent article about a serious security flaw in the current WiFi standard that could impact almost every wireless router and smartphone on the planet. Dubbed the “Krack Attack,” this flaw allows a hacker to make a carbon copy of your WPA2-encrypted network, spoof its MAC address, change the WiFi channel and reroute all network traffic through the...

Security researchers have found a new critical security flaw dubbed “Krack” (Key Reinstallation Attacks) that affects literally every WiFi router and smart phone in use today. The reason? The security flaw resides in the WiFi standard itself, rather than in a third-party product. In addition to being vast in scope and scale, Krack is a particularly nasty, versatile flaw, allowing hackers...

Researchers at the security firm CyberArk have discovered a new attack vector they’ve dubbed “Illusion Gap.” While it’s somewhat tricky for a hacker to implement, when it works, it can be devastatingly effective, completely bypassing Windows Defender, which is security software that comes pre-loaded on all Windows-based computers. To successfully execute the attack, the hacker relies on a combination of social...

One of the first, best pieces of advice computer owners get is to always keep their operating system up to date. It’s sound advice, because OS manufacturers generally do a good job of responding to new attack vectors and releasing security patches designed to make sure that hackers don’t have an easy time breaking into your system. Mac users, though, face...

Late last year, Yahoo announced that it was the victim of the largest data breach in history. It impacted, by their initial estimates, fully one third of their user base, some one billion users. As it turns out, Yahoo’s estimates were wildly inaccurate. Literally every person who had a Yahoo account in 2013 was impacted, making the total in the neighborhood...

Call Grapevine MSP for your business IT needs. 661-377-2992

Have a question? Give us a call or stop by for a quote. It’s that easy.