Do you use the photography network 500PX? If so, be advised that it has been breached by hackers. If you were a 500PX user on or before July 5, 2018, you are among the impacted users. The company discovered evidence of the breach on February 8th, and overall, to this point, their handling of the […]
Author Archives: fusiontechnologysolutions
Linux users, beware of the security flaw known as “Dirty Sock” and identified as CVE-2019-7304. This critical security flaw was discovered by security researcher Chris Moberly, who disclosed the details to the makers of the Ubuntu distribution last month. The flaw resides in the REST API for the Snapd service. That is a universal Linux […]
In 2015, macOS Security Expert Patrick Wardle reported an almost shockingly simple method hackers could employ to get around the Mac Gatekeeper system, which is the first line of defense against malware. He simply bundled two executable files: One signed and one not signed. Apple promptly fixed this weakness when Wardle reported it, but the hackers […]
America might run on Dunkin’, but the company has just taken another big hit. For the second time in recent months, hackers have gained access to an unknown number of DD Perks user accounts. What makes this issue even worse is the fact that the hackers were able to breach the system in exactly the […]
If you’re like most people, the GPS function on your smartphone has become the one feature you use and value more than any other. Few people these days can even remember what life was like before the ascendency of GPS. Paper maps? Written directions? Those things seem as archaic in today’s world as a stone […]
Apple CEO Tim Cook has been busy. Knowing that his company has little chance of dramatically increasing their market share in an increasingly saturated field for handheld devices, they’ve shifted gears. They are building a raft of new features and premium services into the Apple Store to make the product’s ecosystem even more vibrant than […]
How much does a successful ransomware attack cost a victim on average? The numbers will terrify you. Based on the latest statistics compiled by Coveware, each incident of a compromised computer costs a whopping $6,733, which is a hefty 13 percent increase from just one quarter ago. Part of the increase stems from the fact […]
A small but growing number of people have been making the switch to MS Office clones like Apache’s OpenOffice and LibreOffice. The thinking is that they can get the same core functionality but avoid many (if not most of) the costs, bugs, flaws and weaknesses that have plagued Microsoft’s offering. This situation is often seen […]
Skype is introducing a new feature to its video call service that users have been asking about for quite some time now. Background blur. If you regularly make video calls, you’ve probably been in a situation where such a feature would have come in handy. It could be anything, really. Maybe you’re working from home […]
For the last several years, industry experts have been sounding the alarm about password security. We’ve known for quite some time that one of the biggest weak spots in corporate security is the fact that employee passwords are notoriously weak. Millions have been spent on security education. Seminars have been held on the dangers of […]