SamSam Is on the Loose and Headed for a Server Near You

BBH SolutionsNews

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware. Many city workers and citizens in Atlanta, Georgia, won’t soon forget March 22, 2018. On that day ransomware … Read More

Beware of Fake Spectre and Meltdown Patches

BBH SolutionsNews

Cybercriminals are now peddling patches that install malware rather than fix the vulnerabilities recently discovered in computer chips. Learn how hackers are conning people into installing these fake patches so that you do not become the next victim. Cybercriminals did not waste any time after the January 3, 2018, announcement that most of the computer chips in use today have two serious … Read More

Update on Spectre and Meltdown

BBH SolutionsNews

In our last post, we discussed Spectre and Meltdown, two major vulnerabilities that could affect nearly every computing device in the world.  Spectre and Meltdown can allow savvy attackers to copy all the data on a computer.  Some manufacturers, such as Microsoft and Intel, issued patches and others are still working on theirs.  Read more to find out how to … Read More

Spectre and Meltdown Could Compromise Billions of Computers

BBH SolutionsNews

The New York Times reported that security experts recently identified two major vulnerabilities in the processors that power nearly all computers in the world. Called Meltdown and Spectre,these vulnerabilities allow attackers to copy all of the data on a computer. How Can I Protect My Company? Intel announced on January 4 that they developed updates which will protect 90 percent of the processors … Read More

Zero Day Attacks Are Difficult but Not Impossible to Defend Against

BBH SolutionsNews

Hackers look forward to zero-day attacks, while companies dread them. Learn what makes these attacks especially challenging to fend off and the basic precautions businesses can take to avoid becoming a victim. Cybercriminals are continually trying to discover new bugs, backdoors, and other vulnerabilities in software. Worth thousands of dollars on the Dark Web, finding a new vulnerability is like … Read More