
Apple Disables Group FaceTime due to Major Privacy Glitch
Apple has disabled the Group FaceTime software temporarily due to a software bug that allows other iOS users to listen in on private conversations without any notification to reject or accept a call.
The bug is believed to impact any pair of devices running iOS 12.1 or later, according to reports. Security Experts – like Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation – urged iOS users to delete the FaceTime function until a fix becomes available.
- PowerShell Script to Force Uninstall Umbrella Roaming Client
- How to Install Moodle on a Ubuntu 24.04 VPS with a Scripted Guide
- Automating System Updates with Unattended-Upgrades on Ubuntu
- How to Add a Large Disk Partition as Storage in Proxmox VE
- How to Remove Radmin Viewer with PowerShell

Say Goodbye to Windows 7
Goodbye Windows 7 you were loved by almost everyone and was definitely better than Windows VISTA. Many users and company’s are still using windows 7 not realizing what will happen at the end of the year.
NetMarketShare’s states that 36.90% are still using Windows 7 which is fairly high. This will be the year for many computer migrations. As you know like all operating systems before it, Windows 7 will eventually reach the (EOL) end of its life-cycle which is on January 14, 2020 making an upgrade an absolutely essential for the safety of your PC. This means that your computer will no longer be getting security patches and will be vulnerable to hackers. Companies will also have to go through Server 2008 and windows 7 migrations to later Windows OS to maintain Compliance’s.… Read the rest

Top Scam Emails You Should Be Vigilant About
Scam emails have evolved to a point that make it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands to trick victims into providing credentials over a fake landing page.
Roughly one in four Americans in constantly online. According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.
Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the most experienced web surfer.
So What Are Most Common
… Read the rest
Phishing Campaign Delivers A Double Hitter
A phishing attack is being sent with Word attachments that deliver both the Gandcrab ransomware and Ursnif executable. This phishing campaign was detected by researchers at Carbon Black, this attack has hit infected systems with a lethal attack combination that harvests credentials, gathers system and process information and afterwards it encrypts data in order to extort payments from victims.
Jared Myers, senior threat researcher for Carbon Black stated “The campaign appears to be ongoing, as we are seeing additional payloads being posted on pastebin.com that are almost identical to the payloads that were leveraged to data extracted from our analysis of these samples.”
The Attack
The initial phishing emails included a Microsoft Word document that delivers the early stages of the attack. “The overall attack leverages several different approaches, which are popular techniques amongst red-teamers, espionage-focused adversaries and large-scale criminal campaigns,” said Carbon Black researchers in a Thursday analysis.

Best Free Antivirus For 2019
So you looking for 2019’s best Free Antivirus Software to Protect Your Computer From Viruses & Malware. Let me give you some details on the best Free Antivirus. Remember Paid AV is always better than free AV.
Bitdefender Antivirus Free Edition
Simple and Easy
Rating: 8/10
Download
Pros: Top protection against malware; super-easy to use; small performance impact
Cons: No customization options; no quick scans or scan scheduling
Bitdefender is minimal and does not take up much resources even during scans.
Kaspersky Free Antivirus
Lean and mean.
Rating: 8/10
Download
Pros: Excellent malware protection; moderate performance hit; fast scans
Cons: Minimal but has a few extra features
Kaspersky has some more advanced functions compared to others but during scans it can slow down your computer.
Avast Free Antivirus
Nearly a free suite.
Rating: 7/10
Download
Pros: Loaded with extra features; high customization; VPN client
Cons: Malware protection not great; … Read the rest

DHS Issue Urgent Warning on Domain Name Service Hijacking
The Department of Homeland Security states that some agencies are being targeted by specific attacks that modify the Domain Name System Records, which critical function of the processes to locate websites.
DHS issued an emergency statement giving government agencies 10 days to verify that their DNS records are accurate. There has been a series of incidents where email and website traffic has been redirected.
The DHS’s Cyber Security Team said it “is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them,” .
Cyber attacks that target DNS systems can be quite powerful. By modifying a DNS record it can allow an attacker to see traffic flowing to a website or service. They can also craft effective phishing attacks to collect login username and passwords for anything. Hackers can also set a different IP address for the domain … Read the rest

MySQL Design Flaw can be leveraged to steal sensitive information
MySQL has released a security statement providing the following information:
The LOAD DATA
statement can load a file located on the server host, or, if the LOCAL
keyword is specified, on the client host.
There are two potential security issues with the LOCAL
version of LOAD DATA
:
- The transfer of the file from the client host to the server host is initiated by the MySQL server. In theory, a patched server could be built that would tell the client program to transfer a file of the server’s choosing rather than the file named by the client in the
LOAD DATA
statement. Such a server could access any file on the client host to which the client user has read access. (A patched server could in fact reply with a file-transfer request to any statement, not justLOAD DATA LOCAL
, so a more fundamental issue is that clients should

Free vs Paid Antivirus Software: Which Is Better?
Discover the ultimate showdown between free and paid antivirus software. Unveil the pros, cons, and find out which option reigns supreme in protecting your digital world.
Introduction
In today’s digital age, where cyber threats are becoming increasingly sophisticated, protecting your devices and personal information is of utmost importance. Antivirus software plays a crucial role in safeguarding your digital life from malware, viruses, and other malicious activities. When it comes to antivirus software, users often find themselves faced with the choice between free and paid options. This article aims to explore the differences between free and paid antivirus software, helping you make an informed decision to ensure optimal cybersecurity.
Are you seeking antivirus protection but hesitant to invest in paid software? Well, let me share some eye-opening facts: According to the Center for Strategic and International Studies, hacking costs the global economy a staggering 350 billion dollars annually. It’s crucial … Read the rest

Critical Cisco SMB Switch Vulnerability
This Critical Cisco vulnerability affects the following: Cisco Small Business 200 Series Smart Switches, 250 Series Smart Switches, 300 Series Managed Switches, 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, 500 Series Stackable Managed Switches and 550X Series Stackable Managed Switches.
The vulnerability (CVE-2018-15439), which has a critical base severity rating of 9.8 because the default configuration on the devices includes a default, privileged user account that is used for 1st time login and cannot be removed from the switch. The administrator can disable the account by configuring another admin account with access privilege set to level 15. If any of the previous created admin accounts are removed it re-enables the default privileged admin account without any notification.
“Under these circumstances, an attacker can use this account to log in to an affected device and execute commands with full admin rights,” Cisco explained in its advisory… Read the rest

The Best Business Antivirus for 2019
Are you switching to a new Antivirus provider? I have done some leg work to vet the following antivirus programs below. These business antivirus have the best features, such as remote installation and central management. The best business antivirus software will have enterprise-level protection against threats and many new features. I also took into consideration the best bang for the buck.
Webroot SecureAnywhereAn excellent business antivirus suite, giving you various tools such as virus protection, Firewall, Identity Theft Protection, Secure Browsing with real time anti phishing, password and login protection, Mobile Security and system optimizer.
Bitdefender GravityZone Business SecurityThis package makes reliable protection its top priority. Bitdefender products are loved by the independent testing labs, highly rated for malware detection, removal, performance and usability. Most of the features work automatically – anti-malware, firewall, web adviser, URL filtering – but you can also customize the product to control user … Read the rest