ET&T

Tips and Tools Blog

Watch Out For New Facebook “Trusted Friend” Scam

If you can't trust your friends, who can you trust? No one, apparently. There's a new scam on Facebook that's making waves, and it's one you should be mindful of. You may ...

Top Subject People Fall Victim To Is – Data Breach Notification

For hackers around the world, success breeds more success, it seems. A company called KnowBe4 has released a report entitled "Top Ten Global Phishing Email Subject Lines For Q3 2017." To prepare ...

Ransomware Continues To Evolve On Android Devices

Hackers around the world are continuing to innovate at a terrifying, relentless pace, and that truth is reflected in the latest form of ransomware to be found in the wild. Dubbed "DoubleLocker," ...

Hard Drives Susceptible To Sound Waves, Can Double As Microphones

File this one away under “obscure and terrifying.” Recently, a security researcher named Alfredo Ortega, speaking at a security conference in Buenos Aires, unveiled research revealing that the hard drive in your ...

After Yet Another Equifax Hack, IRS Suspends Contract Worth $7.5M

Equifax just can’t seem to get out of its own way. Not long ago, the company suffered a massive data breach which saw the sensitive information of more than 145 million consumers ...

Popular Chrome Ad Blocker Faked, 30k Users Infected With Malware

“Fool me once, shame on you. Fool me twice, shame on me,” as the saying goes. Unfortunately, Google has now been fooled by the same trick twice. For the second time in ...

New Hack Attempts To Access Office 365 Passwords

Companies are getting better at detecting and fending off brute force attacks. Depending on how big, and how hard-hitting the attack is, it can still get through, of course, but the main ...

IT Security Tip: Is it time for cybersecurity planning?

The time to start planning for a security threat isn’t during a virus outbreak or immediately after you discover funds transferred within your banking accounts. Decisions and judgments made during this time ...

IT Security Tip: PCI compliance = a network cybersecurity audit?

Is my PCI compliance good enough to serve as a network cybersecurity audit? We often get asked if an organization has passed ...

OnePlus Mobile Phone Found To Be Collecting User Data

If you own a smartphone made by Chinese manufacturer OnePlus, you can thank security researcher Chris Moore for making a discovery that the manufacturer wasn’t going to tell you about. It turns ...

Contact

ET&TET&T Logo $$$

Cyber Ninja Tips

Join our Cyber Ninja Tips Email List to receive the latest technology news and special offers.


Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • RSS