CREATE ACCOUNT

*

*

*

*

*

*

FORGOT YOUR PASSWORD?

*

Are You Having A Technology Emergency?

QuestingHound Technology Partners Blog

QuestingHound Technology Partners has been serving Florida & the nation since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Has Malware Made a Home in Your Router?

Has Malware Made a Home in Your Router?

Hackers and cybercriminals, like most people, tend to gravitate towards high-reward activities. In this case, that means that focus is turning to creating malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab recently discovered an example of such a malware, so today, we will review this threat and how to best protect your network.

0 Comments
Continue reading

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

0 Comments
Continue reading

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

0 Comments
Continue reading

Are You Prepared To Deal With These EOL Events?

Are You Prepared To Deal With These EOL Events?

Using the most up-to-date versions of your technology’s operating systems is one of the best ways to stay secure. Yet, some organizations forego the jump to more recent operating systems due to the immense up-front expense represented by upgrading multiple servers or workstations at once. Unfortunately, this can be detrimental to your organization’s security, and potentially even put your business’s future at risk.

0 Comments
Continue reading

Is Combining Mobile Apps and ATMs a Good Idea?

Is Combining Mobile Apps and ATMs a Good Idea?

ATMs are, surprisingly enough, not the most secure pieces of technology out there, though there are efforts to improve security by taking advantage of mobile devices. Granted, this won’t be enough to protect against the considerable vulnerabilities in ATMs. In order to maximize security and minimize the amount of damage done by vulnerabilities, the user needs to understand how to protect themselves while using ATMs.

0 Comments
Continue reading

Don’t Be the Last to Learn of this LastPass Vulnerability

Don’t Be the Last to Learn of this LastPass Vulnerability

One of the major password managers out there, LastPass, has become the victim of a major vulnerability. Google researchers from the Zero Day Project discovered this, along with other flaws within LastPass.

Tags:
0 Comments
Continue reading

Tip of the Week: 5 PC Maintenance Tips in Honor of National Clean Out Your Computer Day

Tip of the Week: 5 PC Maintenance Tips in Honor of National Clean Out Your Computer Day

Guess what? Today is National Clean Out Your Computer Day, and we know the perfect way to celebrate! Go grab yourself a can of compressed air and your trusted IT technician, because it would be a shame if you were to miss out on this annual opportunity to improve your computer’s performance.

0 Comments
Continue reading

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

0 Comments
Continue reading

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

0 Comments
Continue reading

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

0 Comments
Continue reading

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

0 Comments
Continue reading

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

27 vulnerabilities: The amount of vulnerabilities that were resolved with the round of security patches in Microsoft’s latest Patch Tuesday. Windows, Microsoft Office, Internet Explorer, the Edge browser, and more, were all affected. It’s important to patch these vulnerabilities as soon as possible, especially if you haven’t done so already.

0 Comments
Continue reading

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

0 Comments
Continue reading

Alert: New Malware Infects Millions of Mobile Devices

Alert: New Malware Infects Millions of Mobile Devices

While security experts tend to focus the brunt of their discussions on desktop OS vulnerabilities, there are plenty of mobile malware threats that fly under the radar. One such malware is called Hummer; a trojan that installs unwanted apps and malware on a device, and can be found on over a million phones worldwide.

0 Comments
Continue reading

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

0 Comments
Continue reading

This Breakthrough By MIT Will Propel Artificial Intelligence to New Heights

This Breakthrough By MIT Will Propel Artificial Intelligence to New Heights

No security solution is perfect. Each one has its own set of pros and cons. For example, relying completely on an automated solution is thorough, but it will flag plenty of threats that aren’t really threats (aka, false positives). Meanwhile, a human overseeing security is great for spotting worrisome trends, but a human can’t possibly catch every single attack. With this dynamic in mind, a team of researchers from MIT has successfully blended the two.

0 Comments
Continue reading

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people who use 7zip itself, and developers who have used the technology in the creation of their own tools and software.

0 Comments
Continue reading

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

All business owners should be aware of which Microsoft products they use. It’s one of the many complex and confusing parts of managing your technology. Of course, all great things must eventually come to an end, and the same applies to your mission-critical applications and operating systems. When your solutions can no longer be considered secure and are no longer supported by the developer, you know it’s time to move on and upgrade to something better.

0 Comments
Continue reading
TOP