Integrated Technology Systems

Blog

Technology is meant to make our lives easier. Sometimes it doesn’t feel like it. Get security tips, tech-focused market insights, and expert advice on everything tech-related here, on our webinars page, or utilize our downloads here.

Two New Threats To Your Company's Security

Reasons Why The Log4j Java Library Security Problem Is Concerning Log4j is a new and exciting tool that allows you to create your own logs. Log4j is a name you ...

Biggest Cyber Security Trends for 2022

Cybercriminals have been particularly helped by the new world that we live in, since 2020's global pandemic. The SolarWinds hack is a great ...

Cox Communications Reports on Recent Data Breach

Cox Communications is one of the largest providers of internet and cable service in the United States. This company is just the latest victim of a hacking attack. The hacker gained access ...

New Corporate Data Breach Hits Panasonic Servers

Japanese electronics giant Panasonic was attacked by internet hackers causing a data breach. In a press release, the company stated that its servers had been attacked on November 11, 2021. This is ...

Online Shopping Retailers Are Hit With Data Breach

The UK's National Cyber Security Centre has identified over 4,000 retailers that were compromised by hackers using known vulnerabilities on checkout pages to steal payment card information and divert payments. Over the ...

Data Breach Caused by Ransomware On Wind Energy Provider

Vestas Wind System is a leader in North American wind turbine manufacturing with over 40,000 MW installed and 36,000 MW in service in the US and Canada. The company recently published ...

Malware Seeks Information on Android Phones

There is a new version of malware that targets Android devices. MasterFred is a new malware that uses well created fake login overlays to steal login and credit card details for Netflix ...

Ransomware Attackers Look For Systems That Are Unpatched

Microsoft has fixed a critical remote execution security vulnerability, identified as CVE-202140444. This flaw was exploited by hackers, beginning on August 18th (2021). Although only ten exploits have been made of this flaw to date, it is possible that there will ...

Malware on Your Mac May Cause Concern

Microsoft researchers have discovered WizardUpdate, a macOS-specific variant of malware. Universal Mac/Apple users should be aware of the new version. This updated version features enhanced persistence and evasion strategies that make it ...

Hackers Have A New Technique Called SEO Poisoning

Hackers now have a new tool that you should be aware of. SEO poisoning, also known by "search poisoning", refers to a technique that employs Black Hat SEO techniques in order to ...

Contact

Integrated Technology SystemsIntegrated Technology Systems Logo $$$

Social Media

  • Facebook
  • LinkedIn
  • RSS