Welcome to the Vircom Blog!

Who are “The Shadow Brokers”?

Who are “The Shadow Brokers”?

Posted on 30 August 2016 at 17:00
By Karuna Warrier   “The Shadow Brokers” – sounds more like the name of a sci-fi movie! The name, is actually loaned from a character in the video game called Mass Effect. Not too far away from a real sci-fi movie plot, “The Shadow Brokers” is the title of an online published data bank of the NSA’s elite hacking team that was leaked. And of course, like any good sci-fi or...
Read More No Comments
In Twitter We Trust: How Scammers Prey on Customer Service Accounts

In Twitter We Trust: How Scammers Prey on Customer Service Accounts

Posted on 23 August 2016 at 17:02
By Bridget Walsh Last week, cyber criminals created a fraudulent customer service account for National Westminster Bank, linking unsuspecting Twitter users to a phishing site. Oddly enough, this wasn't the first time National Westminster Bank has been targeted for cyber assault. Patrons have been plagued by myriad of technical security related issues for over a year. From "missing" payments...
Read More No Comments
Don’t get “trumped” by hackers like the Democratic Party did

Don’t get “trumped” by hackers like the Democratic Party did

Posted on 18 August 2016 at 09:22
By Philip Mak   It’s been a rough couple of months for the Democratic Party. Despite the star power and critical acclaim of the Democratic National Convention, as well as Hillary Clinton taking a comfortable lead over Donald Trump in recent polls, America’s progressive ballot option has found itself embroiled in the aftermath of a series of cybersecurity attacks.  ...
Read More 2 Comments
ProjectSauron is both supremely evil and suggests LoTR confusion

ProjectSauron is both supremely evil and suggests LoTR confusion

Posted on 17 August 2016 at 09:49
By Sara Akkaya   Security researchers have finally cracked a malware dubbed “ProjectSauron” and have labeled the group behind the attack “Strider”. This probably had a lot of you Lord of the Rings fans confused, as both names are references to polar opposite characters. Aragorn, also known as Strider, is one of the good guys in LoTR, while Sauron is the true definition of all...
Read More No Comments
iPhone Phishing — It’s a Culture Issue

iPhone Phishing — It’s a Culture Issue

Posted on 16 August 2016 at 09:13
By Philip Mak   This October, it will have been 15 years since the first iPod hit shelves. Who could have predicted the little brick with the clicking spin wheel would launch a technological revolution to change not only the way we communicate and access information, but interface with our lives?   Apple’s subsequent ascent from obscurity to ubiquity was meteoric. And while...
Read More No Comments
Hackers’ Paradise: Welcome to the Rio Olympics 2016

Hackers’ Paradise: Welcome to the Rio Olympics 2016

Posted on 11 August 2016 at 09:19
By Sara Akkaya   Over 500,000 international visitors are expected to travel Rio for the Olympic Games this month. With this massive surge of visitors comes an ideal opportunity for cybercriminals to work their magic. At the top of the list of potential targets are international tourists, multinational companies and internet users clicking and browsing Olympic-related news. With the...
Read More No Comments
Claiming Your Stake in IoT? Don’t Forget Security

Claiming Your Stake in IoT? Don’t Forget Security

Posted on 10 August 2016 at 09:57
By Jason Carreiro   Businesses are looking to claim their stake in the Internet of Things (IoT). But with all this excitement and eagerness to profit from IoT, are businesses forgetting about the security risks? Are they taking the time to consider adopting strategies to mitigate them?   IoT is already here providing consumers with new experiences.  For example, consumers...
Read More No Comments
10 Ways to Lower Your Risk of Installing a Faulty Patch

10 Ways to Lower Your Risk of Installing a Faulty Patch

Posted on 09 August 2016 at 09:37
By Yves Lacombe   There is no question of the importance of keeping your servers and computers fully patched. Every second of every day hackers are scouring the Internet looking for an opportunity to take advantage of an unpatched server or computer. But what happens when a patch is faulty?   On April 19, 2016, Microsoft released patch KB3148812 a key fix for Windows 10 that...
Read More No Comments
World’s Top 419er gets ‘419ed’: Inside a Multi-million Dollar Cybercrime Ring

World’s Top 419er gets ‘419ed’: Inside a Multi-million Dollar Cybercrime Ring

Posted on 04 August 2016 at 09:40
By Brendan Walsh   If you had a few million dollars for every time you saw a pleading message from a Nigerian prince seeking your help in liquidating his fortune you’d be in the ballpark. This week, one of the world’s most prolific email scammers was arrested in Port Harcourt, Nigeria, delivering a serious win for the ‘good guys’ in the continuing battle against cybercrime....
Read More 1 Comment
Hidden Underneath the Hood: Intelx86s Latest Processor Concerns You Need to Know

Hidden Underneath the Hood: Intelx86s Latest Processor Concerns You Need to Know

Posted on 02 August 2016 at 09:14
By: Yves Lacombe When you buy a car, you want to lift the hood and inspect the engine to see that all the parts are in working order. With Intelx86s latest processor, you are left to wonder what’s hidden underneath the hood. The lack of transparency has raised ongoing security concerns and questions about the processor and whether or not they will be addressed.   These concerns...
Read More No Comments

Questions? Call us.

Speak with Security Expert Engineers to learn more about how Vircom can help your Business IT Security.

1-888-484-7266

Request a demo.

Schedule a demo to talk to a Security Expert Engineer about your specific needs.

Request a demo

Start a free trial.

Test drive the full Vircom experience, free for 30-days. Get started today!

Start a trial

Free Trial Free Email Security Grader