Call Us Today at: 503-850-3055

Blog

Google Analytics Gains Additional Features

Google Analytics Gains Additional Features

October 21, 2020BlogNo Comments »

Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird's eye view into who's searching for what on the internet. Millions of business owners around the world rely on Google Analytics to make informed decisions about how to position and present the products and services they make available...

Read More

Surge In Ransomware Continues In 2020, Targeting Healthcare

Surge In Ransomware Continues In 2020, Targeting Healthcare

October 20, 2020BlogNo Comments »

Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird's eye view into who's searching for what on the internet. Millions of business owners around the world rely on Google Analytics to make informed decisions about how to position and present the products and services they make available...

Read More

New Updates For Office 365 Will Include Phishing Protection

New Updates For Office 365 Will Include Phishing Protection

October 19, 2020BlogNo Comments »

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as "Consent Phishing." That basically means that the hacker in question will use a variety of social engineering techniques to try...

Read More

Kraken Malware Uses Microsoft Windows Error Reporting To Exploit System

Kraken Malware Uses Microsoft Windows Error Reporting To Exploit System

October 15, 2020BlogNo Comments »

Hackers are relentless when it comes to testing the boundaries of software for potential weaknesses to exploit. It seems that an unknown group of hackers has found a new one.  Based on what researchers at Malwarebytes are seeing, a group of hackers has developed a new fileless attack technique designed to abuse Microsoft's WER (Windows Error Reporting) service. They did...

Read More

New HEH Botnet Malware Can Destroy Devices It Attacks

New HEH Botnet Malware Can Destroy Devices It Attacks

October 14, 2020BlogNo Comments »

Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this one is not designed to launch DDOS attacks or install malicious code. Its purpose is much simpler, and it only does two things. First, it performs brute force...

Read More

Update Windows Display Drivers Soon For Security Fix

Update Windows Display Drivers Soon For Security Fix

October 13, 2020BlogNo Comments »

If you've got an NVIDIA graphics card in your PC, and odds are pretty good that you do, be aware that the company recently released a security update. It patches a number of high severity vulnerabilities in the Windows GPU display driver that could allow a hacker to gain complete control over your system via escalation of privileges. If there's...

Read More

Solid State Drives Get Health Monitoring In Windows 10 Update

Solid State Drives Get Health Monitoring In Windows 10 Update

October 12, 2020BlogNo Comments »

Do you have a solid state drive (SSD) inside your PC? An increasing percentage of newer models are including them, taking advantage of their better speeds, relative to HDDs. Unfortunately, a recent Microsoft Windows 10 update wasn't very kind to SSD owners, and caused SSDs to defrag much more frequently than is recommended, which had the effect of shortening their...

Read More

Software Crack Sites Are Being Used To Distribute Ransomware

Software Crack Sites Are Being Used To Distribute Ransomware

October 10, 2020BlogNo Comments »

Hackers have long used the lure of software cracks to infect unsuspecting users, but recently, a new group is making waves and finding significant success in using the Exorcist 2.0 ransomware to lock a user's files and extort them. It's a nasty combination. The user thinks he's getting a free unlock for some piece of software (most often, Microsoft's Windows...

Read More