IT Service and Support based in Kansas City - Batts Business Technology

Blog

Hackers Can Use PDF Files To Access Windows Credentials

Security researcher Assaf Baharav from Check Point Security has discovered a new twist on an old, fairly well-known attack.  He was able to essentially "weaponize" PDFs to steal Windows credentials stored ...

WiFi Sync on iOS Vulnerable To TrustJacking

Owners of Apple devices have a new attack vector to worry about, called "TrustJacking."  Symantec researchers recently stumbled across a pair of scenarios that take advantage of Wi-Fi syncing of various ...

Information On 48 Million People Leaked Through Massive File

File this one away under self-inflicted wounds.  It has recently come to light that a company called LocalBox left a massive data file vulnerable on a cloud server.  The data file ...

New Malware Takes Screenshots and Steals Your Passwords

Recently, a new strain of malware called "SquirtDanger" has been found by researchers at Palo Alto Networks Unit 42, and it's a particularly nasty one for a couple of reasons.  First ...

Are Lasers The Answer To Completely Wireless Computing And Charging?

Researchers at the University of Washington just might change the face of computers and computing forever.  It may seem like the stuff of science fiction, but based on their research, the ...

Bank Employee Steals Info On Over A Million Customers

Atlanta-based SunTrust Bank is the 12th largest bank in the US. They have a major problem, and so do roughly a million and a half of its customers.  According to CEO ...

Apple Recall Affects Some Macbook Pro Batteries

If you recently bought a 13-inch MacBook Pro (without a Touch Bar), you'll want to head to Apple's website.  The company didn't make a big announcement, but they've quietly introduced a ...

Researchers Find Major Vulnerabilities In Banking Apps

Do you do your banking online?  If so, there's bad news in the form of a report recently released by the security firm "Positive Technologies."   The company tested a variety ...

Major Server Ring Distributing Malware Taken Down

Score one for the good guys.  A researcher from BrilliantIT was recently able to figure out how infected computers would connect to EITest's command and control server, and using that information, ...

Hacked Routers Being Used To Spread Malware

Beware of compromised routers spreading malware.  This is according to both Kaspersky Labs and a recently released government report. Using hacked routers to spread malware is nothing new.  Security insiders have ...

Contact

Batts Business TechnologyBatts Business Technology Logo $$$

Social Media

  • Facebook
  • LinkedIn
  • RSS