New Malware Sneaking Onto Mac Computers, Bitcoinists Be Warned

Some tricky new malware is infecting Mac users by imitating legitimate software. The “Advanced Mac Cleaner,” professes to be an anti-malware tool in order to sneak onto Mac computers.   Bitcoinists who use Macs ought to be especially concerned, as the malware specifically targets Mac users by mimicking an anti-malware tool ... Read More »

22nd Aug 2016
Criminals Set Up Fake Companies to Hijack and Sell IPv4 Addresses

Speaking at the North American Network Operators Group’s NANOG 67 conference, Leslie Noble, Senior Director of Global Registry Knowledge at the American Registry for Internet Numbers (ARIN), revealed the lengths to which crooks go to get their hands on brand new IPv4 addresses.Last September, ARIN announced it depleted its IPv4 address pool, ... Read More »

24th Jun 2016
Momentary loss of power to Rack for HMW35 affected several websites

UPDATE: 06/18/2016 4:23am Pacific Time:Server HMW35 has restored to the June 13th backup.  The server is doing background maintence so things may be a bit slow but the websites and mail are back online and running.  Please check back with this page for any new updates. ———— UPDATE: 06/17/2016 11:10pm ... Read More »

14th Jun 2016
Microsoft Patches Outlook.com to Fix Recent Spam Flood

Earlier today, reports surfaced about a giant spam flood that managed to bypass Outlook and Hotmail's spam filters, drowning users in Viagra ads and Russian bride ads. The issue started on the night between May 31 and June 1, 2016, and has slowly escalated until it reached peak annoyance during mid-day today. Angry users flocked to show ... Read More »

1st Jun 2016
Now you can see if your LinkedIn or other accounts were hacked here

Now you can see if your LinkedIn or other accounts were hacked.Were you a LinkedIn user in 2012 or earlier? Email addresses and passwords on more than 164 million users were stolen in the massive hack. Now you can see if you were caught up in the breach. Security expert Troy Hunt, who runs breach notification site Have I Been Pwned, ... Read More »

25th May 2016
Information Stealer "Fareit" Abuses PowerShell

Researchers at Trend Micro have spotted a new variant of the Fareit malware being delivered to victims using Windows PowerShell. Fareit, also known as Pony Loader, is an information stealer malware family that has been making rounds since 2011. It recently joined the long list of threats that abuse the Windows PowerShell task automation and ... Read More »

28th Apr 2016
Apple: WARNING: Software update #031-51913 breaks Ethernet port on most Macs (BCM5701 driver)

UPDATE FROM APPLE: https://support.apple.com/en-us/HT6672**************************************************************Apple has pulled this bad update. This update installed on any Mac today makes ethernet ports stop working!  DO NOT INSTALL!!! I suggest running softwareupdate --schedule off as root to disable updates until Apple ... Read More »

27th Feb 2016
Botnet of Aethra Routers Used for Brute-Forcing WordPress Sites

Italian security researchers from VoidSec have come across a botnet structure that was using vulnerable Aethra Internet routers and modems to launch brute-force attacks on WordPress websites. This particular incident was uncovered after one of the VoidSec researchers was sifting through his WordPress log file and found a brute-force ... Read More »

23rd Dec 2015
Security updates available for Adobe Flash Player

Security updates available for Adobe Flash Player Release date: November 10, 2015 Vulnerability identifier: APSB15-28 Priority: See table below CVE number: CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, ... Read More »

10th Nov 2015
Joomla 3.4.5 Released Fixing a Serious SQL Injection Vulnerability

The Joomla team just released a new Joomla version (3.4.5) to fix some serious security vulnerabilities. The most critical one is a remote and unauthenticated SQL injection on the com_contenthistory module (included by default) that allows for a full take over of the vulnerable site.Being proactive in the protection of your site is of ... Read More »

27th Oct 2015