Eavesdropping on your phone from anywhere in the world
Think your conversations on that Internet phone are secure? Think again. From anywhere in the world, hackers can exploit vulnerabilities in “Voice over Internet Protocol” (VoIP) phones (widely used by...
View ArticleArticle 8
Notice to all AccuNet Customers: Recently there has been an abundance of emails going around that make an attempt to get you to download an infected attachment (usually in the form of a zip file)....
View ArticleA world of hurt after McAfee mistakenly revokes key for signing Mac apps
Just allow untrusted certificates, one customer told. by Dan Goodin – Feb 14 2013, 9:30am EST A McAfee administrator accidentally revoked the digital key used to certify desktop applications that run...
View ArticleLunch Seminar – Real Security in a Virtual World 2/21/2013
AccuNet and WatchGuard Technologies Complimentary Lunch Seminar Real Security in a Virtual World...
View ArticleApple Computers Hit by Sophisticated Cyberattack
Cyberattacks, apparently, happen in threes. After Facebook and Twitter announced that they were breached by sophisticated hackers in recent weeks, Apple said it had been attacked, too, in a rare...
View Article25% of DDoS attacks in 2013 will be application-based
25% of DDoS attacks in 2013 will be application-based Posted on 21 February 2013. Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based,...
View ArticleIs Your Patient Data Protected?
By Steve Williams One of the most import issues we see in dental office computer technology relates to virus attacks. They happen when the employee or doctor innocently clicks on a friends email...
View ArticleWhat to Do After You’ve Been Hacked
Evernote became the latest member of the “we’ve been hacked” club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these days. I’m a member too. And as I...
View Article7 things you can do to make Internet Explorer more secure
How well Internet Explorer—or any Web browser, for that matter—protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here’s how to...
View ArticleWindows XP is coming to End of Life Support April 2014. Are you ready?
Faced with the looming deadline for Microsoft’s official end of support for Windows XP, companies must migrate or risk their IT. by Ricky Ribeiro posted Jan 02, 2014 In the classic 1980s and 1990s PC...
View ArticleTop 5 Best Practices to Prevent against Ransomware
Current Anti-virus with Advanced Threat Protection & Web-Filtering It is not enough to just have anti-virus running on your machines. Please ensure the AV is regularly getting Virus definition...
View ArticleHow do Meltdown and Spectre affect you?
Curious about these processor security vulnerabilities? Here are the technical details: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html …and here is what they...
View ArticleUnusual Ransomware Strain Encrypts Cloud Email
Check out this video of a working “ransomcloud” strain that encrypts cloud email accounts like Office 365 in real-time....
View ArticleMeltdown/Spectre notice for Bitdefender GravityZone users
Are you an AccuNet client using our recommended endpoint security platform, Bitdefender GravityZone? Fear not, GravityZone business products received security patches and compatibility updates...
View Article
More Pages to Explore .....