At DEFCON last week, white hat hackers explained during a presentation that it is indeed possible to hack an Amazon Echo. Security researchers from Chinese conglomerate Tencent described the steps they took to turn a regular, working Echo into a spying…
For managed service providers (MSPs), it’s more difficult than ever to differentiate services and build a viable business. Declining prices, increasing commoditization, and intensifying competition all contribute to this new reality. For some MSPs, bui…
Between ransomware, data breaches, cryptojacking, supply chain attacks, and mobile malware, it’s never been more important to protect your digital life.
A slice of Pie
Grabbing headlines this week was the release of Google’s Android 9 Pie software, which started rolling out on Tuesday to Google Pixel phones. Standard whiz-bang OS enhancements aside, from a security perspective, here’s what we found no…
When you’re using a Wi-Fi network these days, chances are you are counting on one of these protocols: WPA or WPA2. In short, your Wi-Fi signal is protected by the Wi-Fi Protected Access (WPA or WPA2) encryption standard. These wireless industry standar…
The Company
In 1953, Range Telephone Cooperative was established in Forsyth, Montana to provide telephone service to those rural areas that Mountain Bell could not effectively serve. Today, the company and its affiliates provide voice and high-speed i…
Questions still surround the TSMC (Taiwan Semiconductor Manufacturing Company) computer virus incident which shut down operations for the world’s largest semiconductor foundry last Friday, August 3. While the company maintains this was not due to a cyb…
Steam game found to be secretly cryptomining
“Malicious cryptomining has become so popular among cybercriminals that it has earned its own name: cryptojacking,” states Avast security evangelist Luis Corrons. “It is one of the most popular ways to make…
SamSam ransomware was first spotted in the digital wild back in 2015. Since then, its purveyors have racked up approximately $6M in extorted ransom money, experts surmise, and its diabolical reign shows no sign of slowing. The malware continues to be i…
In the world of cybersecurity and malware, what was cutting-edge yesterday is old hat tomorrow, which is why we never rest. We’re focused on staying ahead of the bad guys. We issue updates, upgrades, and patches regularly to keep you fully protected by…