Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Some of the Worst Data Breaches Since September

Some of the Worst Data Breaches Since September

Cybersecurity is becoming a massive issue for every organization due to the immense amount of data breaches that take place regularly. Businesses of all types are looking at strategies to protect their sensitive customer and employee data from hackers, malware, and any other potential danger. The problem is it’s not always as simple as just implementing cybersecurity software.

0 Comments
Continue reading

New Cryptomining Malware Targets Windows Computers

crypto-12-6

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass delete files, lock your system down or flood you with pop-up ads. Rather, its purpose is to install itself stealthily and live in the background where it will steal resources from your PC. It plans on using the resources to mine various forms of cryptocurrency on behalf of the malware's owners, giving them a fat payday and you a frustratingly slow system.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

Hackers Are Already Targeting Disney Plus Accounts

streaming-11-27

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since it was first announced. If the early indications are any clue, Netflix has little to worry about, but Disney has their hands full. Mere hours after the service was launched, complaints started flooding in, and not just on Disney's website.

0 Comments
Continue reading

Some Hackers Promote Cybersecurity

Some Hackers Promote Cybersecurity

Most people have acquired much of their familiarity with what a hacker is through the mixed representation seen in pop culture today… but does this impression match up to a hacker in real life? Popular entertainment unfortunately doesn’t differentiate between different hacker types and their motivations very well, so that’s what we’ll handle here.

Understanding Hackers, Based on Motive

0 Comments
Continue reading

Public Chargers Can Expose Your Device To Hacking And Malware

airport-11-23

On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a convenient means of recharging their favorite devices. Unfortunately, things are not working out quite according to plan. Naturally, hackers around the world have taken note, and regard such easily accessed terminals as juicy targets and low hanging fruit. According to a security alert published by the Los Angeles District Attorney's office, many of these stations have been compromised, and using them could expose you to malware.

0 Comments
Continue reading

Hackers Are Imitating Government Agencies To Spread Malware

government-11-22

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with a variety of malware.

0 Comments
Continue reading

Another WhatsApp Vulnerability Has Been Found

whatsapp-11-21

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner of the globe. The company is still reeling from the blowback associated with these various issues, but their troubles don't seem to be over yet.

0 Comments
Continue reading

Fake Voicemail Messages Tricking People Into Opening Malicious Content

voicemail-11-19

Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full recording. Researchers at McAfee Labs had this to say about the matter:"Over the past few weeks McAfee Labs has been observing a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials. At first, we believed that only one phishing kit was being used to harvest the user's credentials. However, during our investigation, we found three different malicious kits and evidence of several high-profile companies being targeted."

0 Comments
Continue reading

Racoon Stealer Malware Is New One To Watch For

raccoon-11-18

There is a new form of malware that you and your staff need to be aware of. That's because it's gaining in popularity among cyber criminals around the world. Known as 'Racoon Stealer,' it is noteworthy not for its complexity but rather, for its extreme ease of use. Worse, the malware's designers have been marketing it aggressively both inside and out of the Dark Web,

0 Comments
Continue reading

Popular Web Domain Registrar Hit With Data Breach

web-domain-11-16

Do you have web domains registered with Web.com, Network Solutions or Register.com? If so, at least some of your data may have been compromised. Web.com recently reported that they and their two subsidiaries named above were breached by an unknown third party. The breach occurred in late August 2019 and the company discovered evidence of the intrusion on October 16th, 2019.

0 Comments
Continue reading

Google Chrome Users Should Update Immediately

update-11-14

If you're using Google's Chrome browser to read this article, be advised that the company has announced the presence of a pair of major, Zero-Day vulnerabilities that put you at immediate risk. Not only are the flaws of the highest possible severity, but hackers have already begun exploiting them.

0 Comments
Continue reading

Discord Users Be Careful Of Malware And Information Theft

discord-11-11

Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server. In addition, they are abusing the chat client to force it to perform a variety of malicious behavior. Unfortunately, this is not a new problem.

0 Comments
Continue reading

Some iOS Apps Found To Have Clicker Trojan Malware

trojan-malware-11-9

Recently, a survey of Apple's App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the 'Clicker' Trojan malware. As malware goes, this variant isn't especially dangerous to those who wind up infected with it, but it's still problematic. A spokesman for Wandera had this to say about the recent discovery: "The objective of most clicker trojans is to generate revenue for the attacker on a pay-per-click basis by inflating website traffic. They can also be used to drain the budget of a competitor by artificially inflating the balance owed to the ad network."

0 Comments
Continue reading

Malware Takes Down Services At Popular Billing Company

hacked-11-6

Billtust is major player in the US financial services sector that provides a variety of billing and payment processing services for some of the biggest financial institutions in the nation. On October 17th, they suffered a malware attack that brought all of their services to a grinding halt. Unfortunately, the company did not notify any of their customers about the incident. Instead, one of their customers, Wittichen Supply Company, noticed issues with Billtrust's services and posted information about the outage on their company's website.

0 Comments
Continue reading

New Server Data Breach Reported at NordVPN

breach-11-5

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. It was compromised due to an insecure remote management system that was left in place by the data center provider. Worse, this was a system that NordVPN never even knew existed.

0 Comments
Continue reading

Backdoor Could Be Used On Microsoft SQL Without Detection

back-door-11-4

If you haven't heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture. Researchers have found malware strains in the wild that take advantage of the backdoor, allowing attackers to remotely connect to any account on the server running MSSQL version 11 or 12 by using a "magic password."

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106