Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Watch Out For Large Amounts of Scams This Holiday Season

holiday-resize_20191227-162950_1

The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber Monday. Sadly, those two big shopping days mark the beginning of a mad sprint to push out as many shopping-related scams as possible. Researchers at ZeroFOX have been monitoring the online retail landscape and have identified more than 60,000 potential scams, most of them aimed at mundane product categories that are not categorized as luxury items.

0 Comments
Continue reading

Automation Plays a Critical Role in Cybersecurity

Automation Plays a Critical Role in Cybersecurity

Automation is sometimes misconceived as a troublesome or unreliable addition to business. It’s not about replacing people with machines, it’s about getting more done with the people you have. Having an attitude that doubts technology and believes nothing can replace human processing can quickly put you at a disadvantage compared to your competitors.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

zombie-12-2

Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor generations from 2011 and beyond. Intel hasn't had a good run of late, being beset almost constantly by these kinds of issues, and Zombieload was one of three new MDS variants discovered.

0 Comments
Continue reading

New Ransomware Targets Removable And Attached Drives

drive-11-29

There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. One of the most unusual features of this strain is the fact that it specifically doesn't target the C: drive of the target computer.

0 Comments
Continue reading

Microsoft Cortana App Getting Dropped From Many Countries

microsoft-11-28

It appears that Microsoft is getting rid of their Cortana App in several countries due to security concerns. The question is whether the United States will be next. Recently, the following notice appeared on Microsoft's UK site:"To make your personal digital assistant as helpful as possible, we're integrating Cortana into your Microsoft 365 productivity apps. As part of this evolution, on January 31, 2020, we're ending support for the Cortana app on Android and iOS in your market. At that point, the Cortana content you created - such as reminders and lists - will no longer function in the Cortana mobile app or Microsoft Launcher, but can still be accessed through Cortana on Windows. Also, Cortana reminders, lists, and tasks are automatically synced to the Microsoft To Do app, which you can download to your phone for free.After January 31st, 2020, the Cortana mobile app on your phone will no longer be supported and there will be an updated version of Microsoft Launcher with Cortana removed."

0 Comments
Continue reading

Hackers Are Imitating Government Agencies To Spread Malware

government-11-22

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with a variety of malware.

0 Comments
Continue reading

Another WhatsApp Vulnerability Has Been Found

whatsapp-11-21

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner of the globe. The company is still reeling from the blowback associated with these various issues, but their troubles don't seem to be over yet.

0 Comments
Continue reading

Google Chrome Users Should Update Immediately

update-11-14

If you're using Google's Chrome browser to read this article, be advised that the company has announced the presence of a pair of major, Zero-Day vulnerabilities that put you at immediate risk. Not only are the flaws of the highest possible severity, but hackers have already begun exploiting them.

0 Comments
Continue reading

Employees Targeted By Hackers Posing As HR Department

HR-11-12

Just when you think scammers couldn't get any lower, they find new ways to prove you wrong. Recently, a new phishing scam has been spotted in the wild, this one baiting potential victims with the possibility of pay raises. The scammers structured their email so that they appeared to come from the Human Resources department of their victims' companies. They asked the recipient of their phishing email to open an Excel spreadsheet bearing the name "salary-increase-sheet-November-2019.xls."

0 Comments
Continue reading

New Server Data Breach Reported at NordVPN

breach-11-5

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. It was compromised due to an insecure remote management system that was left in place by the data center provider. Worse, this was a system that NordVPN never even knew existed.

0 Comments
Continue reading

Backdoor Could Be Used On Microsoft SQL Without Detection

back-door-11-4

If you haven't heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture. Researchers have found malware strains in the wild that take advantage of the backdoor, allowing attackers to remotely connect to any account on the server running MSSQL version 11 or 12 by using a "magic password."

0 Comments
Continue reading

Are Hackers Using Popular Assistant Devices To Listen To Users?

google-home-11-2

The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable. They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and unsavory developers. They can be used to spy on and even steal sensitive information from unsuspecting users. This is not new in and of itself. Security researchers around the world have, at various points over the last couple of years, sounded the alarm about weaknesses and exploits. To the credit of both companies, any time this has happened, both Amazon and Google have responded promptly, plugging gaps and shoring up the security of their devices. Unfortunately, every few months or so, new exploits are discovered. The two companies are essentially playing Whack-A-Mole with security flaws, which appear to have no end. Recently, security experts published two videos, one for Alexa and one for Google Home.

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106