40 Apple iPhone 6 Plus and iPhone 6 tips and tricks
The Apple iPhone 6 and iPhone 6 Plus arrived with a splash and a huge initial sales success, but since they are such a huge upgrade over the smaller, 4-inch iPhone 5s, there is a ton of new features and little things that you can do to tweak the iOS 8 experience on Apple’s […] Continue Reading…
Shellshock is a new security threat worse than Heartbleed
The Health Information Trust Alliance has issued warnings about Shellshock, a system vulnerability it says could cause much more damage than the infamous Heartbleed bug. The HITRUST Cyber Threat Intelligence and Incident Coordination Center, known as the C3, announced this past week it has been tracking the remote code execution vulnerability, which it says can […] Continue Reading…
Warning: Breach of Patient Identification Information
On August 18, 2014 the United States Computer Emergency Readiness Team, US-CERT, issued an alert that there there was a breach of patient identification information. US-CERT is aware of a breach of sensitive patient identification information affecting approximately 4.5 million patients and customers of Community Health Systems, Inc. As part of DHS, US-CERT is working together […] Continue Reading…
Warning: New Point of Sale Malware Attack
On August 18, 2014 the National Cybersecurity and Communications Integration Center, NCCIC, and United States Computer Emergency Readiness Team, US-CERT, issued an alert that there is a new POS, Point of Sale Malware Attack. This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information […] Continue Reading…
Researchers create unlock key to reverse CryptoLocker Virus
Before now Cryptolocker victims had to pay a hefty fee to get the keys to reverse the Cryptolocker Virus. All 500,000 victims of Cryptolocker can now recover files encrypted by the malware without paying a ransom. The malicious program encrypted files on Windows computers and demanded a substantial fee before handing over the key to […] Continue Reading…