Category: Security

Tech Time Warp: First mobile malware makes its debut

Tech Time Warp: First mobile malware makes its debut

Back in the pre-smartphone days, an international group of hackers set out to prove no technology was safe from malware. In June 2004, the group 29A — 29A being the hexadecimal version of “666” — released the first virus targeting...

/ June 14, 2019
Cryptojacking is making a comeback

Cryptojacking is making a comeback

Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...

/ June 12, 2019
Steganography makes a comeback

Steganography makes a comeback

Steganography was malware before there was malware. In fact, the term dates back thousands of years and has only recently been used in cyber-circles. The word’s root is derived from the Greek word steganos, which means “covered” or “concealed.” Pre-technological generals used...

/ June 5, 2019
Building a defense from social engineering attacks

Building a defense from social engineering attacks

Last week Smarter MSP examined the security threat that social engineering poses to organizations  of all sizes. Social engineering is a technique that hackers use to gain access to  an organization’s network, without having to break down the metaphorical door....

/ May 29, 2019
Tech Time Warp: Prince Philip’s inbox gets hacked

Tech Time Warp: Prince Philip’s inbox gets hacked

Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...

/ May 24, 2019
Need for zero-trust IT environments bodes well for MSPs

Need for zero-trust IT environments bodes well for MSPs

As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...

/ May 23, 2019
Social engineering: a hacker’s most effective weapon

Social engineering: a hacker’s most effective weapon

What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...

/ May 22, 2019 / 1 Comment
Worldwide popularity of GDPR on the rise

Worldwide popularity of GDPR on the rise

The first anniversary of a move by the European Union to impose a General Data Protection Rule (GDPR) arrives at the end of this week. GDPR was enacted to protect the digital rights of anyone doing business with a company...

/ May 21, 2019
Ask an MSP Expert: How have email threats evolved?

Ask an MSP Expert: How have email threats evolved?

Q: As cybercriminals are becoming more sophisticated, it is harder to keep up with the different types of attacks. What are some of the most prevalent methods of email attacks today, and what do I need to know about them?...

/ May 20, 2019
Latest Intel chip vulnerabilities represent a major challenge for MSPs

Latest Intel chip vulnerabilities represent a major challenge for MSPs

Remember the news about the Intel Meltdown and Spectre chip vulnerabilities that emerged last year? Remember all the panic and the patches? Well, get ready because you’re about to go through all of that again with the latest Intel chip vulnerability....

/ May 17, 2019