Computer Systems Development Services

Blog

Be Careful Holiday E-cards Could Contain Malware Or Viruses

There's a war on Thanksgiving and Christmas, but it's taking a very different form than what commonly gets reported in the news media. This war is being waged by hackers and scammers, ...

Adobe Acquired Magento Marketplace Suffers Data Breach

Recently, the Magento Marketplace was acquired by Adobe and suffered a breach that exposed a limited amount of user data to an unknown third party. When Adobe discovered evidence of the breach, ...

Watch Out For Large Amounts of Scams This Holiday Season

The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber ...

Security Issues Found In Several VNC Applications

Microsoft RDP has its share of problems. That simple truth has sparked the rise of a number of open-source VNC (Virtual Network Computing) applications, which allow a user to remotely control another ...

New Cryptomining Malware Targets Windows Computers

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass ...

Google’s Cloud Print May Be Discontinued

Are you a fan of Google's Cloud Print service?  It's fantastic because it allows you to print from anywhere to anywhere, which makes it utterly invaluable. Like so many great services Google ...

New T-Mobile Data Breach Compromised Customer Info

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a ...

New Ransomware Called DeathRansom Hits The Scene

Early in 2019, a new strain of ransomware appeared.  Called "DeathRansom," its bark was initially much worse than its bite.  Researchers quickly discovered that the new strain only pretended to encrypt a ...

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

Zombieload is back.  First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor ...

Twitter Making Changes To Their Political Ad Rules

Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content.  The ...

Contact

Computer Systems Development ServicesComputer Systems Development Services Logo $$$

Social Media