Integrated Technology Systems

Blog

Technology is meant to make our lives easier. Sometimes it doesn’t feel like it. Get security tips, tech-focused market insights, and expert advice on everything tech-related here and on our webinars page.

Data Breach Caused by Ransomware On Wind Energy Provider

Vestas Wind System is a leader in North American wind turbine manufacturing with over 40,000 MW installed and 36,000 MW in service in the US and Canada. The company recently published ...

Malware Seeks Information on Android Phones

There is a new version of malware that targets Android devices. MasterFred is a new malware that uses well created fake login overlays to steal login and credit card details for Netflix ...

Ransomware Attackers Look For Systems That Are Unpatched

Microsoft has fixed a critical remote execution security vulnerability, identified as CVE-202140444. This flaw was exploited by hackers, beginning on August 18th (2021). Although only ten exploits have been made of this flaw to date, it is possible that there will ...

Malware on Your Mac May Cause Concern

Microsoft researchers have discovered WizardUpdate, a macOS-specific variant of malware. Universal Mac/Apple users should be aware of the new version. This updated version features enhanced persistence and evasion strategies that make it ...

Hackers Have A New Technique Called SEO Poisoning

Hackers now have a new tool that you should be aware of. SEO poisoning, also known by "search poisoning", refers to a technique that employs Black Hat SEO techniques in order to ...

Recent Study Revealed Insights About Passwords And People

The digital identity company Beyond Identity recently published a study that contains many surprises regarding password security and passwords. These are important information IT professionals and owners of small- or medium-sized businesses ...

Inform Your Employees about the New DocuSign Phishing Campaign

Phishing attacks usually target executives. These attacks are focused on high-ranking targets with extensive system access. However, this seems to be changing. Researchers ...

Hackers Use DDOS Attacks to Profit From Businesses

Hackers have used distributed denial-of-service attacks (DDOS) since the dawn of the internet. If you have enough internet-connected devices, you can ping multiple servers simultaneously and knock them offline. You can keep ...

Millions Of Android Devices Are Infected With Dangerous Malware

Zimperium zLabs has detected a dangerous malware attack that infected millions of Android devices in over 70 countries including the United States. This malware uses ...

New Malware Is Targeting Linux And WordPress Users

A new strain of malware which has been dubbed 'Capoae' has been spotted in the wild. It was written in Go and this strain targets Linux systems and WordPress installations. It was ...

Contact

Integrated Technology SystemsIntegrated Technology Systems Logo $$$

Social Media

  • Facebook
  • LinkedIn
  • RSS