Blog

Update Addresses Zero Day Exploit For Some Apple Devices

If you're not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn't yet patched. In many (but not all) ...

New Phishing Attack Delivers Three Types Of Malware To Victims

Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...

Microsoft Warns New Sysrv Botnet Variant Is Dangerous

Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet.  They have dubbed the new variant Sysrv-K. This new variant works in two ways.  First, it exploits a ...

You Might Need This HP Bios Security Update

HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company.  In both cases, the vulnerabilities ...

Update Zyxel Products To Fix Possible Security Vulnerability

Do you use a Zyxel firewall?  If so, there's good news.  The company has fixed an issue you may not have even been aware that you had. The company pushed out the ...

Say Goodbye To The Apple iPod

It is the end of an era.  Apple recently announced that they were discontinuing the legendary iPod, which is now in its 7th generation of production. When first released more than fifteen ...

Windows 11 May Release New Feature For Copying Information

If you're a member of the Windows Insiders group, then you are likely already aware of this. If not, here's something else to look forward to when Windows 11 is formally released.  ...

New Method Hides Malware In Windows Event Logs

At least one group of hackers has learned a new trick you need to be aware of.  Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs ...

Beware Of New Backdoor Malware Targeting Linux Users

The name Kevin Beaumont may not be familiar to you, but if you're a Linux or Solaris user, he may have just saved you a whole lot of grief. Recently, Mr. Beaumont ...

New Phishing Scams Using Twitter Account Emails

Hackers around the world are increasingly targeting verified Twitter accounts with emails designed to pilfer your Twitter login credentials. Verified Twitter accounts differ from standard Twitter accounts in that they sport a ...

Contact

LecsITLecsIT Logo $$$

Social Media