GEM Blog - latest and greatest by Megan Greene

We all know the name Internet Explorer - from the late 1990’s through the early 2000’s, IE was THE tool for browsing the internet. Whether for business or pleasure, Internet Explorer was a household name. Fast forward to 2019 and Internet Explorer has faded into the background in favor of other browsers like Chrome, Firefox, and Safari, or the less popular, and less useful, Microsoft Edge. While most individuals have migrated away from Internet Explorer in favor of more robust browsers, there are a handful of businesses who still use Internet Explorer despite the fact that all development of new features on the platform has stopped and support is basically non-existent as of 2015. Given the current selection of browser options, why on earth would a business choose to remain linked to Internet Explorer?

Read More

Share This Post:

/ Alan Hernandez / 07.12.19

Weekly Cybersecurity Review - Database Leak Exposes Student Records on K12.com

Weekly Cybersecurity Review - Database Leak Exposes Student Records on K12.com

Share This Post:

In this week's cybersecurity review we take a look at two different critical database leaks, a new phishing campaign targeting Amazon users, and an Apple Watch vulnerability that allows for eavesdropping.

go to article

/ Alan Hernandez / 07.05.19

Weekly Cybersecurity Review - Sony Online Entertainment DDoS Attacker is Sentenced

Weekly Cybersecurity Review - Sony Online Entertainment DDoS Attacker is Sentenced

Share This Post:

In this week's Security News Review we take a look at a critical flaw in 7-Eleven's 7pay app, a new phishing campaign targeting Croatian Government Employees, a warning issued by the FBI for sextortion scams, and DerpTrolling's court sentence.

go to article

/ Alan Hernandez / 07.01.19

Weekly Cybersecurity Review - Fake jQuery Attack Vector Reappears

Weekly Cybersecurity Review - Fake jQuery Attack Vector Reappears

Share This Post:

In this week's Security News Review we take a look at Malware found in seemingly harmless games in the Google Play Store, an attack on the Russian Search Engine, Yandex, an Instagram phishing scam, and fake jQuery reappearing in the wild.

go to article

/ Alan Hernandez / 06.21.19

Weekly Cybersecurity Review - Florida City Pays $600,000 Ransom

Weekly Cybersecurity Review - Florida City Pays $600,000 Ransom

Share This Post:

In this week's Cybersecurity review we take a look at a Florida City paying ransom to hackers, cron scheduled malware, a javascript based trojan horse, and a new Mac malware that has been found in cracked versions of Ableton Live 10.

go to article

/ Alan Hernandez / 06.14.19

Weekly Cybersecurity Review - AI for Cyber Security

Weekly Cybersecurity Review - AI for Cyber Security

Share This Post:

In this week's Cyber Security Review we take a look at a security breach at a life insurance provider, a DDoS attack on Telegram, Javascript Template Attack, and how the Federal Government would implement AI into its cybersecurity programs.

go to article
Weekly Cybersecurity Review - Android Backdoor Created by Third Party Applications

Weekly Cybersecurity Review - Android Backdoor Created by Third Party Applications

Share This Post:

In this week's Security News Review we take a look at a data leak caused by a misconfigured Elastic Search server, a new extortion campaign that threatens users with spam, Google's new restrictions on header size for Chrome browsers, and an Android...

go to article

/ Alan Hernandez / 05.15.19

Weekly Cybersecurity Review - Attackers Delete GitHub, GitLab, and Bitbucket repositories

Weekly Cybersecurity Review - Attackers Delete GitHub, GitLab, and Bitbucket repositories

Share This Post:

In this week's cybersecurity review, we take a look at a calculated anti-virus breach, Baltimore's servers being hit with ransomware, a Jenkins vulnerability, and a nasty attack on Github/Gitlab/Bitbucket repositories.

go to article

/ Alan Hernandez / 05.06.19

Weekly Cybersecurity Review - Spam Surge of 1.5 Million Caused by Compromised Office 365 Accounts

Weekly Cybersecurity Review - Spam Surge of 1.5 Million Caused by Compromised Office 365 Accounts

Share This Post:

This week we take a look at the increase in brute-force attacks on edge devices, a new exploit targeting SAP systems, US Orgs readiness for CCPA, and a large surge of spam emails from compromised cloud email accounts.

go to article

/ Alan Hernandez / 04.05.19

Weekly Cybersecurity Review - Cloud Suite for Malware Distribution?

Weekly Cybersecurity Review - Cloud Suite for Malware Distribution?

Share This Post:

In this week's security news review we take a look at Microsoft Window's new cybersecurity tool suite, concerns surrounding iOS' permissions on third parties, and more!

go to article
12
12
Top