Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Hackers

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

b2ap3_thumbnail_atm_malware_threats_400.jpgMalware that targets ATMs isn’t a new concept. After all, ATMs use internal computers that can be hacked just the same as any old workstation. The prime difference is that hacking into an ATM allows for a direct dispensing of cash, rather than some crafty behind-the-scenes action. A new type of ATM malware, titled GreenDispenser, is a cause for concern in Mexico, and could spread to other countries if left unchecked.

Tagged in: Hackers Malware Security

b2ap3_thumbnail_the_dark_web_400.jpgHave you ever wondered what hackers do with all of the data they steal on a regular basis? Sure, they could go public with it like they did with the Ashley Madison and Sony hacks, or they could sell it and make some quick cash. Credentials like passwords, usernames, Social Security numbers, and more, can be sold for top dollar in illegal markets, but how much can your identity go for?

Tagged in: Hackers Privacy Security

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

b2ap3_thumbnail_threat_of_cyberwar_400.jpgFor argument’s sake, do you think society today relies too much on technology? In the Information Age, both businesses and governments have to be more careful than ever about how they approach cybersecurity. However, what would happen if a massive cyber war were to render any and all computing systems in the United States inert? Granted, such a powerful, in-depth attack is unlikely, but it’s sometimes fun (and frightening) to examine the worst-case scenario.

b2ap3_thumbnail_radio_signal_hacker_400.jpgHackers are always coming up with new, unprecedented methods of hacking unsuspecting victims. Despite their best efforts, technology professionals have managed to keep up with threats, but this only forces threats to continue to innovate. In fact, some hackers are even capable of using radio signals to hack into an unconnected device and steal confidential corporate data.

b2ap3_thumbnail_hacker_attacker_400.jpgIn today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?

Tagged in: Hackers Hacking Malware

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

Tagged in: Hackers Privacy Security

cyber_security_dhs_priority_400.jpgArguably one of the most imperative assets for any government is an IT infrastructure, and in 2015, the U.S. government is realizing that security breaches are some of the most dangerous cyber threats to watch out for. As evidenced by the U.S. Department of Homeland Security, IT security is just as important as other matters of national security.

How to Remove the Harmful Superfish App Off Your PC

Posted by on in Alerts

b2ap3_thumbnail_lenovo-superfish_400.jpgOne would assume that software preinstalled on a new PC is secure and has been properly vetted by the manufacturer. This is the case 99 percent of the time, but an exception has recently been discovered with the Superfish app, which came installed on new Lenovo computers sold between September and December of 2014. How can you protect your PC from this fishy security threat?

Tagged in: Hackers Malware Security

b2ap3_thumbnail_it_health_security_400.jpgProbably one of the more dangerous hacks so far in 2015, healthcare-provider Anthem has been breached by hackers and its data accessed. The breach may have provided the hackers with up to 80 million sensitive customer records, including Social Security numbers, dates of birth, and much, much more.

Tagged in: Hackers Privacy Security

3 Ways to Bring the Fight to Bots

Posted by on in Security

b2ap3_thumbnail_bot_fight_400.jpgThe Internet is up to its ears with threats and hackers, but some of the most annoying malicious entities are bots. These are systems which can gather information from all kinds of sources. While some aren’t malicious in nature (think SEO bots which gather data from websites), there are those that aren’t so innocent. These tend to fall into the hands of hackers and attempt to steal information or send spam.

Tagged in: Hackers Malware Security

b2ap3_thumbnail_password_protection_400.jpgThis holiday season might leave technology and entertainment supergiant Sony with nothing but a big lump of coal in its stocking. In a high-profile hack, hackers continue to leak Sony’s employees’ sensitive information like Social Security numbers, passports, and even personal emails. This is obviously an issue for the company, but so is its lack of IT security, as shown by their passwords being stored in a folder named “Passwords.”

b2ap3_thumbnail_apt_hackers_are_dangerous_400.jpgHackers come in all shapes and sizes, with varied levels of skills to boot. The generic garden-variety hacker will probably only try to hack your email and send spam, or steal your personal information. However, there are much worse threats out there, like APT hackers. This week, we’ll cover how you can spot these wolves in sheep’s clothing.

Alert: Cryptowall 2.0 Ransomware On the Loose

Posted by on in Alerts

b2ap3_thumbnail_alert_cryptwall_400.jpgThe latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

Tagged in: Alert Hackers Malware

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

Is Your Antivirus Software Up to Snuff?

Posted by on in Security

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpgAll of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

Tagged in: Hackers Privacy Security

b2ap3_thumbnail_security_from_hackers_400.jpgWhen you were a kid, did you ever ask your parents for a cool new toy only to have your request denied because you were in the habit of breaking everything? Your parents would point out your destructive habit and tell you, "This is why we can't have nice things." As an adult, the coolest toy is the Internet and hackers want to break it.

Tagged in: Hackers Privacy Security

Thieves Want Your Backup Data

Posted by on in IT Blog

b2ap3_thumbnail_internet_thieves_400.jpgAre you aware of the value of your company's data? If you lost it all today, what would it cost your business in terms of productivity, downtime, and liability? Security precautions need to be taken in order to keep your data safe, including data backups. However, after you have a backup system in place, don't neglect the need to secure those backup files!

Tagged in: Backup Hackers Security

EasyBlog Latest Blogs

Things That Go Bump in the Server Closet
Miscellaneous
Halloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodc...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046