Debian Information Technology Inc.
  • Facebook
  • Twitter
  • LinkedIn

News

Hackers Are Using Resumes To Deliver Malicious Software

Hackers have used poisoned documents to deliver malware payloads for years. Recently though, researchers at the security company Cofense have spotted a new twist to the ploy, aimed squarely at HR departments. The ...

Another IRS Phishing Campaign To Watch Out For

The Internal Revenue Service recently issued a warning that all taxpayers should be aware of. The agency has received a growing number of reports concerning unsolicited email messages bearing the subject lines: ...

Texas Government Gets Hit With Major Ransomware Attack

This year stands to shatter last year's record in terms of the number of successful hacks against businesses and government agencies. It seems that the hackers have a new favored tool:  The ...

Open Source Programs Continue To Get Attacked By Hackers

This year hasn't been good for users of Open Source software, which at one level or another, includes just about everybody.  Unfortunately, a recent grim discovery makes it unlikely that we'll see ...

Payment Forms Cause Large Amount Of Online Data Breaches

When surveying the state of your company's security, it's important to understand what your biggest risks are. According to the 2019 Application Report published by F5 Labs, the answer is simple. Fully ...

Study On Passwords Shows People Still Use Breached Passwords

Google recently released a large-scale password study that will probably give every IT manager in the country heartburn. The results of their study indicate that a disturbing percentage of users continue to use ...

BlueKeep Virus Continues To Be An Issue For Microsoft

Wormable bugs are an ongoing concern for Microsoft.  Recently, the company released a set of patches for two newly discovered 'BlueKeep-Like vulnerabilities" that impact a wide range of Windows Operating Systems. These ...

Biometric Breach Exposes Fingerprints Facial Data & Personal Info

Do you employ a biometric security solution at your company to control building access? If your solution employs BioStar 2 technology (which is often integrated into third-party systems such as Nedap's AEOS ...

New Adware Uses Interesting Technique To Avoid Detection

Being more of a nuisance than anything, adware doesn't see as many innovations as other forms of malware. Once in a while, an adware developer surprises the security researchers. That happened recently ...

Devices Attached To Corporate Networks Are Being Targeted

Grim news comes out of Russia, as reported by Microsoft.  The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium. Their other ...