NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and Citrix users. While many assume hackers are targeting government agencies, the truth is these vulnerabilities can affect even the smallest of businesses. As a small or medium business, it’s important to address known vulnerabilities …

Securing Facial Recognition Data and Potential Risks

As federal agencies and local law enforcement continue to use facial recognition to probe for potential suspects it is also considered to be an invasion of privacy. …Log into your iPressGo account to read the full article.

Linux Users Should Be On High Alert For Drovorub Malware Attacks

Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub malware, especially when using RDP. …Log into your iPressGo account to read the full article.

Google Releases a version of iPhone AirDrop on Androids

By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works on devices specifically manufactured by Apple and is therefore the centerpiece of that company’s “walled garden” ecosystem. …Log into your iPressGo account to read the full article.

Protecting Global Networks and Identifying Threats

As the dark web becomes multi-national, US government agencies are racing to identify who are responsible for the latest ransomware attacks. …Log into your iPressGo account to read the full article.

Vishing Scam Is Targeting Telecommuters

A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do to avoid becoming the next victim. …Log into your iPressGo account to read the full article.

How Contact-Tracing Apps Work

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate. …Log into your iPressGo account to read the full article.

Huawei Ban Spreads as 5G Network Approaches Rollout

Trade constraints interfere with mobilization of 5G network platform due to concerns of espionage, semiconductor sales and backdoor security risks. …Log into your iPressGo account to read the full article.

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here is what you need to know about this model. …Log into your iPressGo account to read the full article.