Blog
Password Best Practices
Password protection is the best place to start if you want to ramp up your cybersecurity. However, because of the frequent use of passwords, people tend to overlook their significance and make careless mistakes, which could lead to breaches in security.
Sextortion and Romance Scams: Dodging Cupid’s Malicious Arrow
This year’s theme for Safer Internet Day on February 7 was sextortion with a focus on financial sextortion and making sure young people know they can always get help.
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads
A recent surge in JavaScript injections targeting WordPress sites has resulted in fake DDoS prevent prompts which lead victims to download remote access trojan malware.
Yandex Email Admin Sold His Inbox Access and Compromised Almost 5,000 Accounts
Data breaches appear to be common events these days. This one came from an INTERNAL threat, which is frightening indeed.
Multiple Vulnerabilities in Apple Products
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for local code execution.
Schemes Targeting Cryptocurrency Holders
There have been a growing number of incident reports regarding schemes targeting cryptocurrency holders and potential purchasers.
Facebook Messenger Scams
The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) continues to receive reports of Facebook Messenger social engineering scams.
Successful Thanksgiving Free Meal Giveaway!
GreenTechnology, in cooperation with several local businesses, handed out a total of 517 meals for Thanksgiving!
GoDaddy Breached – Plaintext Passwords – 1.2M Affected
GoDaddy disclosed that an unknown attacker had gained unauthorized access to the system used to provision the company’s Managed WordPress sites, impacting up to 1.2 million of their WordPress customers.
6 Key Security Findings for 2021
Bad news: hackers and threats thrived and even evolved amid the global coronavirus pandemic.
SCAM Alert: Beware of Fake Email from “A Professional Photographer” claiming Copyright Infringement
Several GTS clients have received emails from a “professional” photographer or illustrator, claiming you have copyrighted images on your website. This is a SCAM.
Google Chrome Vulnerabilities Could Allow for Arbitrary Code Execution
An arbitrary code execution vulnerability security flaw has been found in Google’s Chrome browser.