More than 6.000 WordPress websites have been hit by malware that tricks visitors into downloading fake Google Chrome updates. These attacks, which began in June 2023, use stolen admin credentials to install malicious plugins. These plugins display...
Category: ICT Company
How to Detect and Fix Japanese SEO Spam on Your Website in 10 Steps!
Japanese SEO spam, also known as the “Japanese keyword hack,” is a type of malware where hackers use your website to inject Japanese search terms, which lead visitors to fake stores. This can harm your SEO and cause your website to be blacklisted.
Critical Vulnerability in LiteSpeed Cache Plugin Threatens Millions of WordPress Sites!
A serious security vulnerability in the LiteSpeed Cache plugin for WordPress has exposed more than five million websites to potential takeovers. This vulnerability, discovered by Wordfence, allows attackers to unlawfully create administrative accounts by…
Workaround/Solution: 'Blue Screen of Death' blocks millions of Windows 10 PCs
The recently released update of CrowdStrike has left many users facing a Blue Screen of Death (BSOD). This problem has led to broken systems and frustration. We have a workaround that can help you get your systems operational again...
Hundreds of thousands of WordPress sites vulnerable due to critical Forminator leak: What you need to know!
Hundreds of thousands of WordPress sites are vulnerable due to a critical vulnerability in the popular Forminator plugin. This vulnerability, known as CVE-2024-28890, has an impact score of 9.8 on a scale of 10. This means that the problem is very serious and requires immediate action...
Windows 10 and 11 update KB5039299 and KB5039302 withdrawn: What you need to know!
Microsoft recently retired the preview updates KB5039299 for Windows 10 and KB5039302 for Windows 11 due to serious issues. These updates caused some PCs to stop booting, especially virtual machines. The updates are again...
Why you want to call via Microsoft Teams!
Microsoft Teams calling blurs the lines between landlines, mobile numbers and Teams calls, creating a seamless communication experience. Employees have one number for all devices and a consistent availability status. Benefits of...
Ransomware attacks are increasingly a cover for espionage
Ransomware attacks are increasingly used as a cover for espionage activities. According to a SentinelOne investigation, cyber espionage groups, such as the China-backed ChamelGang, use ransomware to disguise sabotage and theft as regular…
350.000 Spotify accounts targeted by hackers
350.000 Spotify accounts targeted by hackers Up to 350.000 Spotify accounts have fallen prey to hackers who crack them using weak passwords. This has been revealed by security researchers from the Israeli website VPNMentor. Although the...
What is a Brute Force Attack and how do you prevent it?
If you think that a Brute Force attack is something that doesn't concern you, then we're going to have to disappoint you. Every website on the Internet can feel the full force of Brute Force attacks. Think about how many accounts you have? Are all your websites...
IT Security
ICT Security ICT security is an important part of managing your IT systems. Protecting your IT environment against threats such as malware, viruses, phishing and other cyber-attacks is vital for the continuity of your...
How do I recognize a phishing email?
How do I recognize a phishing email? One click on a dangerous link and without realizing it you are one step closer to giving hackers access to your company's IT systems, bank details or other personal information….. This type of cyber attack…
How does a DDoS attack work?
What is a DDOS attack? A Distributed Denial of Service attack or also known as DDoS is a cyber attack in which a lot of traffic is sent to computers, computer networks or servers, making them unusable for the normal user. You can...
What is a Chromebook?
What is a Chromebook? In addition to Microsoft's Windows and Apple's macOS, Google has also created its own operating system for laptops: Chrome OS. So-called Google laptops with this system are usually relatively cheaper than other laptop suppliers. But are they...
Brute force attacks increase through RDP ports
Brute force attacks on the rise It happens all too often that while working from home the back door is left wide open for hackers, you may be doing this without thinking about it, having unnecessary active ports on your computer is one. ..
How do hackers get your password?
How do hackers intercept passwords? In every movie with a hacker, there's always that scene where the hacker has to guess the right password. The hacker is under enormous pressure, where every second counts. They make one or two wrong attempts to get the password...
8 reasons to outsource IT management
The decision to handle IT management internally or outsource it can be difficult. Based on our years of experience providing top-notch IT management at Flexamedia, we've compiled eight key reasons to help you consider outsourcing your IT management.
RDP attacks increase during COVID-19 pandemic
Companies forced to use remote work environments after the COVID-19 pandemic may have exposed themselves to the possibility of RDP (Remote Desktop Protocol) attacks. At the beginning of 2020, the global Lockdown...
What is a VPN and how does it keep you safe on the internet?
What comes to mind when you think of PC security? An antivirus that defends you against hackers and malware, or a firewall that monitors suspicious internet traffic? These are frequent answers. But have you ever heard of a Virtual Private Network or in...
Hackers took Utrecht municipalities hostage and demanded 750.000 euros
Hackers took the municipalities of Utrecht hostage and demanded 750.000 euros The criminal group that hijacked the back-up system of the municipality of Hof van Twente wanted 750.000 euros to release the stolen documents. The hackers said they had 40 terabytes of…
How do I prevent phishing attacks
Small Business IT Strategies Phishing is the biggest threat to small businesses. The hacker tries to trick targets into providing their personal information or installing malicious software. The US Department of Justice...
4 ways to protect your business data
4 Ways to Protect Your Business Data Data is a big talking point at every level of commerce, and for good reason. All types of market data give companies the tools they need to become better informed and therefore more successful...
Ransomware, what is it and how do you get rid of it?
WHAT IS RANSOMWARE? Ransomware is a small program, call it a computer virus, that sneaks into your computer and does not cause any direct damage. However, what ransomware does do is lock down your computer. It blocks a certain area of access...
Working safely from home during corona
Working Safely from Home. With Working Safely from Home, we consider several factors. For example: A secure network environment. A VPN is best for this. Beware of phishing emails. Be mindful of what you share during a video conference. Don't click on...
Is iCloud's 5GB free storage properly secured?
Is iCloud safe? Do you know all the privacy and security features of iCloud? If you haven't been paying much attention, you might want to rethink how you use iCloud. Understanding how this digital storage space works will give you a better idea of what you...
Beware – Microsoft warns Android users about new ransomware
Microsoft is warning of a new form of mobile Ransomware that uses incoming calls and Android's Home button to lock the device behind a ransom screen. Discovery Ransomware Android The newly discovered Ransomware concerns...
7 Network Security Tips for Your Business
Network security applies to your business Network security threats and vulnerabilities remain a nightmare for small businesses. That's why the topic of network security and how it applies to your business is important....
Microsoft Internet Explorer ends after 25 years.
Microsoft Teams web app will stop supporting Internet Explorer 11. Microsoft has announced that it will stop supporting Internet Explorer 11 starting in November. The Microsoft Edge Legacy desktop app will also stop supporting any...
