RDP stands for Remote Desktop Protocol that is used by people that need to access the desktop of a remote Windows computer. Hackers have been gaining access to these remote machines for over a decade thanks in part to weak passwords that are used to “secure” them by just guessing the username and password. Once... Continue reading Ransomware Deployment Protocol (RDP)
A new antivirus bug called AVGater was discovered by a Vienna, Austria researcher named Florian Bogner. The bug can be exploited by local users only and allows the attacker to have full control over the computer by misusing the restore from quarantine in antivirus. The three access areas of antivirus are the unprivileged domain that... Continue reading Antivirus Bug Can Be Used to Attack You
Social Media Hacking Social media has become a gold mine for hackers. It’s just so easy! Individual social media platforms have been hackable since their introduction. Social media users don’t understand their vulnerability or even recognize how they are opening themselves up. Social media to most means they have a platform to showcase their most... Continue reading How Hackers Are Getting Social With Your Media
Email might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all... Continue reading What Can a Hacker Do With Your Email Address?
I often hear people say that they don’t understand why a hacker would be interested in their computer and subsequent life. When you consider how much you do on your computer, it becomes clear that the value of your computer lies in the life you have built over your lifetime. This image shows you what... Continue reading What Can a Hacker Do With Your Computer?