Author: IT Xpress
11
Jun
// php the_time('Y') ?>
Be careful what attachments you click on! Cryptowall 3.0 is gaining momentum and encrypting user data worldwide, holding it for $500 ransom. Worried about your system's security and protection from threats like this? IT Xpress can help, from managed service plans to active security gateways that can block threats like these at the front door… See
http://myitxpert.biz for more information!
Comments Off on Be careful what attachments you click on! Cryptowall 3.0 is gaining momentum and encrypting user data…
Filed under: News
Author: IT Xpress
11
Jun
// php the_time('Y') ?>
Be careful what attachments you click on! Cryptowall 3.0 is gaining momentum and encrypting user data worldwide, holding it for $500 ransom. Worried about your system's security and protection from threats like this? IT Xpress can help, from managed service plans to active security gateways that can block threats like these at the front door… See
http://myitxpert.biz for more information!
Comments Off on Be careful what attachments you click on! Cryptowall 3.0 is gaining momentum and encrypting user data…
Filed under: News
Author: IT Xpress
9
Jun
// php the_time('Y') ?>
Excellent info on ditching password post-it notes and moving to a secure password manager. #LastPass

5 minute fix – How to use a password manager
nakedsecurity.sophos.com
This 5 minute fix will show you how to choose and use a password manager.
Comments Off on Excellent info on ditching password post-it notes and moving to a secure passwor…
Filed under: News
Author: IT Xpress
9
Jun
// php the_time('Y') ?>
Excellent info on ditching password post-it notes and moving to a secure password manager.
#LastPass
Comments Off on Excellent info on ditching password post-it notes and moving to a secure password manager. #LastPass
Filed under: News
Author: IT Xpress
9
Jun
// php the_time('Y') ?>
Many people still believe you only get malware from 'bad sites' (or Facebook). But hackers learned long ago that compromising legitimate websites to spread malware gave them a MUCH bigger group of victims to target. Simply put – NO website you visit can be assumed 'safe'. They get compromised all the time. Always stay vigilant.

Seven out of 10 Cyberattacks Hack Websites Target Secondary Victims
www.hotforsecurity.com
Nearly 70% of cyber attacks target secondary victims, and not the owners of the hacked website, according to the 2015 Data Breach Investigations Report, an annu
Comments Off on Many people still believe you only get malware from 'bad sites' (or Facebook). B…
Filed under: News
Author: IT Xpress
9
Jun
// php the_time('Y') ?>
Many people still believe you only get malware from 'bad sites' (or Facebook). But hackers learned long ago that compromising legitimate websites to spread malware gave them a MUCH bigger group of victims to target. Simply put – NO website you visit can be assumed 'safe'. They get compromised all the time. Always stay vigilant.
Comments Off on Many people still believe you only get malware from ‘bad sites’ (or Facebook). But hackers learned long…
Filed under: News
Author: IT Xpress
5
Jun
// php the_time('Y') ?>
Have to share this just for the artwork. Facebook scams are always a threat. Beware what you click and simply untag yourself if your privacy settings allowed the tag in the first place.
Bitdefender originally shared:
#Scam alert: an attractive video capture is posted on users’ Walls. Twenty of the victims’ Facebook friends are tagged in the post, so those who have not tweaked their privacy settings will be tagged without their consent.
Find out more and stay #safe: http://bit.ly/facebook_scm

Comments Off on Have to share this just for the artwork. Facebook scams are always a threat. Bew…
Filed under: News
Author: IT Xpress
5
Jun
// php the_time('Y') ?>
Have to share this just for the artwork. Facebook scams are always a threat. Beware what you click and simply untag yourself if your privacy settings allowed the tag in the first place.
Original Post from Bitdefender:
#Scam alert: an attractive video capture is posted on users’ Walls. Twenty of the victims’ Facebook friends are tagged in the post, so those who have not tweaked their privacy settings will be tagged without their consent.
Find out more and stay #safe: http://bit.ly/facebook_scm
Comments Off on Reshared post from Bitdefender:
Filed under: News
Author: IT Xpress
4
Jun
// php the_time('Y') ?>
Part II of Hot for Security's look at ransomware and how it works. An informative read.

How Does Ransomware Work? The Ultimate Guide to Understanding Ransomware – Part II
www.hotforsecurity.com
Now that we’ve been introduced to ransomware, let’s see how it spreads and infects machines. How does it enter systems? Common penetration techniques inc
Comments Off on Part II of Hot for Security's look at ransomware and how it works. An informativ…
Filed under: News
Author: IT Xpress
4
Jun
// php the_time('Y') ?>
Part II of Hot for Security's look at ransomware and how it works. An informative read.
Comments Off on Part II of Hot for Security’s look at ransomware and how it works. An informative read.
Filed under: News
Author: IT Xpress
4
Jun
// php the_time('Y') ?>
Tech scammers don't just target PC users! Microsoft, Apple, Yahoo, etc will never call you directly. Google only will if you use their business services like Adwords or My Business and even then it's very rare and usually in response to something you've encountered or done and they're trying to help (and certainly are NOT asking for money).

Tech Support Scammers Are Organized, Run Targeted Campaigns for Mac and Windows
news.softpedia.com
Scammers try to force victims into calling bogus support
Comments Off on Tech scammers don't just target PC users! Microsoft, Apple, Yahoo, etc will neve…
Filed under: News
Author: IT Xpress
4
Jun
// php the_time('Y') ?>
Tech scammers don't just target PC users! Microsoft, Apple, Yahoo, etc will never call you directly. Google only will if you use their business services like Adwords or My Business and even then it's very rare and usually in response to something you've encountered or done and they're trying to help (and certainly are NOT asking for money).
Comments Off on Tech scammers don’t just target PC users! Microsoft, Apple, Yahoo, etc will never call you directly…
Filed under: News
Author: IT Xpress
2
Jun
// php the_time('Y') ?>
If you upgrade to Windows 10 – you may not be able to play DVDs if your computer lacks a 3rd Party DVD player. If it does? Install the free VLC media player.

Microsoft explains what you’ll lose by upgrading to Windows 10
www.theverge.com
Microsoft announced today that it will be launching Windows 10 on July 29th, encouraging Windows 7 and 8.1 users to reserve their free upgrade with a notification in their task bar. However, while…
Comments Off on If you upgrade to Windows 10 – you may not be able to play DVDs if your computer…
Filed under: News
Author: IT Xpress
2
Jun
// php the_time('Y') ?>
If you upgrade to Windows 10 – you may not be able to play DVDs if your computer lacks a 3rd Party DVD player. If it does? Install the free VLC media player.
Comments Off on If you upgrade to Windows 10 – you may not be able to play DVDs if your computer lacks a 3rd Party DVD…
Filed under: News
Author: IT Xpress
2
Jun
// php the_time('Y') ?>
Macs are definitely more secure than PCs, but they can still be compromised. Exploits like this are especially dangerous since you can't remove it even if you wipe and reinstall OSX! At the very least, Mac users should be using some type of realtime antimalware package to protect against malicious downloads.

New exploit leaves most Macs vulnerable to permanent backdooring
arstechnica.com
Hack allows firmware to be rewritten right after older Macs awake from sleep.
Comments Off on Macs are definitely more secure than PCs, but they can still be compromised. Exp…
Filed under: News