Preparing…
952-223-4422
234 Broadway Street South Jordan, MN 55352

Hackers backed by Lebanese government affect thousands

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years. Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have […]

Hospital in Greenfield held hostage to hackers

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up their computer systems, preventing access to patient information and other necessary medical records. Part of the Greenfield health network became locked down due to ransomware, preventing further medical action for […]

Russia has been banned from the 2018 Olympics, possibly connected to Olympic hacking

Recently we had a post involving some hacking attempts against those in cooperation with the 2018 Winter Olympics. The hacking attempts involved sending malware-full emails from spoof accounts to those with information on the progression and supervising of the 2018 Winter Olympics in Pyeonchang. Russia had been banned from the Olympics a little over a […]

Companies who have been breached are still confident in their defenses

There has been alot of articles and news covering companies and businesses who have security breaches and had people’s vulnerable information out in the hands of some hackers. Despite this news, APAC organisations are still confident in their online security measures, and feel like they don’t need to change or enhance those measures. Fortinet recently […]

WPA2 protocol leaves all access points vulnerable! Including yours!

Recently, some online researchers have discovered a fatal flaw in the WPA2 protocol. This flaw can affect anyone and everyone that is involved with Wi-Fi access. This flaw allows potential attackers to manipulate vulnerable information such as passwords, e-mails, and other encrypted data, whilst intercepting that information they may also leave ransomware or other malicious […]