OLD – 2021 AND Pre – Employment Page

Subscribe Now - Stay Up-To-Date With The Latest Technology News



    Emerald City Solutions Blog

    Stay Up-To-Date With The Latest Technology News

    Spreading Botnet has Years-Old Flaw to Thank

    Spreading Botnet has Years-Old Flaw to Thank

    When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems if a patch has been successfully developed. Unfortunately, t ...

    Continue reading
    1513 Views
    0

    There’s Nothing “Smashing” About the Nigelthorn Malware

    There’s Nothing “Smashing” About the Nigelthorn Malware

    Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.” Nigelthorn’s Method of Attack When scrolling on Fa ...

    Continue reading
    1311 Views
    0

    Can You Recognize the Risks that Appear in Your Email?

    Can You Recognize the Risks that Appear in Your Email?

    Email is often touted as a favorite medium for launching cyberattacks against businesses and individuals. This is because it’s easy to hide the true intent behind an email attack within its contents, whether they are embedded images in the message itself, or links to external sources. How can you ...

    Continue reading
    1369 Views
    0

    Links Discovered Between WannaCry and North Korea

    Links Discovered Between WannaCry and North Korea

    In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, ...

    Continue reading
    1372 Views
    0

    Latest Petya Ransomware Attack is Brutal Reminder of Cyber Security Importance

    Latest Petya Ransomware Attack is Brutal Reminder of Cyber Security Importance

    A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been ...

    Continue reading
    1811 Views
    0

    ALERT: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

    ALERT: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

    On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning. The ...

    Continue reading
    1427 Views
    0

    Cops Lock Up Criminals, Ransomware Locks Up Cops

    Cops Lock Up Criminals, Ransomware Locks Up Cops

    Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the eme ...

    Continue reading
    1401 Views
    0

    Emerald City Solutions’s IT Threat Glossary

    Emerald City Solutions’s IT Threat Glossary

    Understand what threats are in store for your business. The Internet can be a dangerous place, especially now that hackers are taking advantage of advanced tools and threats. New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organizati ...

    Continue reading
    1398 Views
    0

    10 Types of Hackers You Need to Know About

    10 Types of Hackers You Need to Know About

    When you hear the term “hacker,” what do you imagine? You likely see what many see, a lone user hunched over a computer, creating chaos for chaos’ sake. However, this is a dangerously narrow view of those who qualify as “hackers.” Not all hackers are the same. There are different motivati ...

    Continue reading
    1844 Views
    0

    Search Blogs

    Recent Comments

    Ready to Talk?