fbpx

Archives

  •  

    June 4, 2020

    Ransomware–Zcrypt

    Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player installation. The malware copies itself onto removable drives to infect other machines. Zcrypt uses the Nullsoft Scriptable Install System, which works like a Zip file, decompressing[...]
  •  

    June 4, 2020

    Microsoft Account Security Alert

  •  

    June 4, 2020

    How Secure IS Your Network?

    xxxx Often Administrators & Managers may assume that once the network has been working and serving the organization users their work is considered as done! Changes in technology & business making are forcing us to adapt to these changes and provide solutions that are costly reasonable but not punching holes in our security. You may[...]
  •  

    July 15, 2019

    Watch Web Scams?

    Last week I was on nytimes.com when a window popped up telling me that my computer was infected, that windows was infected and I was prompted to call a windows expert. It looked just like a Microsoft page – I have been on the internet since 1999 so I usually do not fall for these[...]
  •  

    July 11, 2019

    Three Signals Your Team Needs Threat Intelligence

    Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a critical aspect of[...]
  •  

    July 11, 2019

    Qnap Ransomware Was Discovered

    Two Cybersecurity companies’ researches have discovered malware that is targeting Network Attached Storage (NAS) devices manufactured by Taiwan-based QNAP Systems. Experts from Intezer and Anomali have separately discovered this new malicious software that will eventually encrypt the data stored on these devices. This malicious software is looking for certain vulnerabilities that are currently known but[...]
  •  

    July 11, 2019

    Are You Using Logitech Keyboard?

    Some Logitech keyboards, mice and wireless presenters have security vulnerabilities. These weakness will allow an attacker to eavesdrop keystrokes and even infect the host system. These are bad news! This means that sites you visit and passwords that you type will be captured by an attacker without your knowledge as this data is traversed in[...]
  •  

    December 13, 2017

    Three Signals Your Team Needs Threat Intelligence

    [img src=”/wp-content/uploads/sites/2405/2017/12/blog-img-three-signals-team-needs-threat.jpg” class=”aligncenter”] Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a[...]

2Secure Corp | Cybersecurity Services Based In NY

P

464 Kings Highway

2nd Floor

Brooklyn, NY 11223

q

646-755-3933

©2020 2Secure Corp. All Rights Reserved.

Privacy Policy

Archives

Archives

  •  

    June 4, 2020

    Ransomware–Zcrypt

    Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player installation. The malware copies itself onto removable drives to infect other machines. Zcrypt uses the Nullsoft Scriptable Install System, which works like a Zip file, decompressing[...]

    Read More

  •  

    June 4, 2020

    Microsoft Account Security Alert

    Read More

  •  

    June 4, 2020

    How Secure IS Your Network?

    xxxx Often Administrators & Managers may assume that once the network has been working and serving the organization users their work is considered as done! Changes in technology & business making are forcing us to adapt to these changes and provide solutions that are costly reasonable but not punching holes in our security. You may[...]

    Read More

  •  

    July 15, 2019

    Watch Web Scams?

    Last week I was on nytimes.com when a window popped up telling me that my computer was infected, that windows was infected and I was prompted to call a windows expert. It looked just like a Microsoft page – I have been on the internet since 1999 so I usually do not fall for these[...]

    Read More

  •  

    July 11, 2019

    Three Signals Your Team Needs Threat Intelligence

    Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a critical aspect of[...]

    Read More

  •  

    July 11, 2019

    Qnap Ransomware Was Discovered

    Two Cybersecurity companies’ researches have discovered malware that is targeting Network Attached Storage (NAS) devices manufactured by Taiwan-based QNAP Systems. Experts from Intezer and Anomali have separately discovered this new malicious software that will eventually encrypt the data stored on these devices. This malicious software is looking for certain vulnerabilities that are currently known but[...]

    Read More

  •  

    July 11, 2019

    Are You Using Logitech Keyboard?

    Some Logitech keyboards, mice and wireless presenters have security vulnerabilities. These weakness will allow an attacker to eavesdrop keystrokes and even infect the host system. These are bad news! This means that sites you visit and passwords that you type will be captured by an attacker without your knowledge as this data is traversed in[...]

    Read More

  •  

    December 13, 2017

    Three Signals Your Team Needs Threat Intelligence

    [img src=”/wp-content/uploads/sites/2405/2017/12/blog-img-three-signals-team-needs-threat.jpg” class=”aligncenter”] Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a[...]

    Read More

Next

  •  

    June 4, 2020

    Ransomware–Zcrypt

    Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player installation. The malware copies itself onto removable drives to infect other machines. Zcrypt uses the Nullsoft Scriptable Install System, which works like a Zip file, decompressing[...]

    Read More

  •  

    June 4, 2020

    Microsoft Account Security Alert

    Read More

  •  

    June 4, 2020

    How Secure IS Your Network?

    xxxx Often Administrators & Managers may assume that once the network has been working and serving the organization users their work is considered as done! Changes in technology & business making are forcing us to adapt to these changes and provide solutions that are costly reasonable but not punching holes in our security. You may[...]

    Read More

  •  

    July 15, 2019

    Watch Web Scams?

    Last week I was on nytimes.com when a window popped up telling me that my computer was infected, that windows was infected and I was prompted to call a windows expert. It looked just like a Microsoft page – I have been on the internet since 1999 so I usually do not fall for these[...]

    Read More

  •  

    July 11, 2019

    Three Signals Your Team Needs Threat Intelligence

    Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a critical aspect of[...]

    Read More

  •  

    July 11, 2019

    Qnap Ransomware Was Discovered

    Two Cybersecurity companies’ researches have discovered malware that is targeting Network Attached Storage (NAS) devices manufactured by Taiwan-based QNAP Systems. Experts from Intezer and Anomali have separately discovered this new malicious software that will eventually encrypt the data stored on these devices. This malicious software is looking for certain vulnerabilities that are currently known but[...]

    Read More

  •  

    July 11, 2019

    Are You Using Logitech Keyboard?

    Some Logitech keyboards, mice and wireless presenters have security vulnerabilities. These weakness will allow an attacker to eavesdrop keystrokes and even infect the host system. These are bad news! This means that sites you visit and passwords that you type will be captured by an attacker without your knowledge as this data is traversed in[...]

    Read More

  •  

    December 13, 2017

    Three Signals Your Team Needs Threat Intelligence

    [img src=”/wp-content/uploads/sites/2405/2017/12/blog-img-three-signals-team-needs-threat.jpg” class=”aligncenter”] Sometimes it’s just plain hard to tell if your security team is really on top of things. They certainly seem to be, as they go about plugging security gaps, carrying out important-sounding procedures, and educating the rest of the staff about the dangers out there. But your company’s information security is a[...]

    Read More