Blog
May 13, 2016 by Vertical Axion
Alex Holden is one of the good guys. You’ve probably never heard of him, but he works for Hold Security, and spends his time in the dark corners of the internet, scouting out what data the hacking community has for …
Read more »
May 12, 2016 by Vertical Axion
The numbers are in, and they’re pretty grim. Trustware has released their annual Global Security Report, which outlines the current trends in cybercrime. Chief among the findings in the report is that fully 60% of the hacking attacks the company …
May 11, 2016 by Vertical Axion
Earlier this year, Bangladesh Bank, one of the largest in the nation of Bangladesh, was successfully breached. The keen hackers made off with a staggering $80 million, when they used the bank’s system to hack into the SWIFT network, which …
May 10, 2016 by Vertical Axion
Does your company work with health information in any capacity? If it does, be advised, HIPAA violations are real, and can cost you and your business big money. The most recent company to find itself in the crosshairs of the …
May 9, 2016 by Vertical Axion
On the heels of the FBI’s dustup with Apple Computer, the Judiciary committee of the U.S. House of Representatives has advanced a bill to the full chamber that would give cloud-stored data and emails more than 180 days old some …
May 7, 2016 by Vertical Axion
Windows XP was, by any measure, the most successful and ubiquitous operating system of all time. To this day, now two years after Microsoft formally ended support for the platform, there are still tens of millions of computers running XP. …
May 6, 2016 by Vertical Axion
Here’s the hard reality: Even if you devote sufficient resources to get the best security money can buy to protect your business from hackers, you might still be at risk. The reason? Well, in addition to the fact that there’s …
May 5, 2016 by Vertical Axion
Are you, or is someone you know a driver for Uber? Have you used the rideshare service to get from Point A to Point B? If the answer to either of these questions is yes, then odds are good that …
May 4, 2016 by Vertical Axion
When you surf the web, do you use a VPN (Virtual Private Network)? More than half a billion of the web’s users do, which is about a quarter of the web’s population, so you may be one of them. If …
May 3, 2016 by Vertical Axion
Google takes security more seriously than most companies, and it’s no wonder, given that the company’s Android Operating System is currently in use by more than 1.4 billion users worldwide. The latest version of Android (version 6.0, dubbed Marshmallow) includes …
May 2, 2016 by Vertical Axion
You may not have heard much about USB-C cables, but you will. They are the future of USB connectivity, and will ultimately replace both USB-A and USB-B cables, which are the ones you’re likely using right now to connect your …
April 30, 2016 by Vertical Axion
If you have a Windows-based PC (and you probably do), then you’ve almost certainly had the dubious honor of seeing the dreaded BSOD, or Blue Screen of Death. Unfortunately, since the first appearance of that screen, it has had a …
April 29, 2016 by Vertical Axion
Remember the good old days, when all Adware did was make your web browsing experience inconvenient by bombarding you with annoying popups? Sadly, those days appear to be over. There’s a new generation of Adware that goes far, far beyond …
April 28, 2016 by Vertical Axion
So, it turns out that the “Badlock” Samba exploit wasn’t quite as bad as it was originally cracked up to be. If you haven’t heard of Badlock, you’re not alone. It made the rounds in Internet security circles, but wasn’t …
April 27, 2016 by Vertical Axion
If your company has one or more of millions of PCs still running Windows XP, your options are collapsing around you rather quickly, making it more important than ever to finally get around to upgrading to a more current OS.…
April 26, 2016 by Vertical Axion
It’s been a busy week at Oracle. The company has recently released a massive flurry of patches that fix a staggering 136 security issues for a wide range of the products it sells. This release comes in tandem with the …
April 25, 2016 by Vertical Axion
Last year, an IoT (Internet of Things) security firm called Bastille Networks uncovered an attack from an unexpected vector. Hackers can actually take control of your wireless mouse, which has no on-board security, and use the device to spoof keyboard …
April 23, 2016 by Vertical Axion
Are you still using single factor authentication in your business? If so, you are taking an unnecessary risk. If the only thing standing between the hacking community and your company’s data is a password, then no matter how robust those …
April 22, 2016 by Vertical Axion
Toy manufacturing giant Mattel was recently the target of a whaling scam that could have been both highly embarrassing and extremely costly, if not for a single stroke of luck. If you’ve not heard the term, “whaling” is a subset …
April 21, 2016 by Vertical Axion
More problems for the Adobe Flash player, and a new type of hacking attack that security experts are referring to as “Typosquatting.” If you’ve not yet heard the term, you’re not alone, but you can bet that it will be …
April 20, 2016 by Vertical Axion
If you have Apple QuickTime installed on a Windows-based PC, you should uninstall it immediately. In a public statement issued on 4/14/2016, the US-CERT recommends the removal of QuickTime for Windows. Apple announced that they’re no longer supporting the product …
April 19, 2016 by Vertical Axion
The statistics are both shocking and dismaying. Even in the face of innumerable high profile data breaches, people still aren’t serious about personal data security. In fact, a shocking 95% of people admit to sharing between one and six passwords …
April 18, 2016 by Vertical Axion
“What’s old is new again.” The simple truth is that tastes and trends seem to repeat. We’ve seen it countless times in the world of fashion, and now, we’re seeing something similar in the hacking community. Over the past year …
April 16, 2016 by Vertical Axion
The hacking community seems to have found another viable business model, this time, in the form of ransomware. Given the success that hackers have been finding with this type of attack lately, they’ve upped their game, and have begun to …
507-388-3880