2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Blog

IT Services & IT Solutions Mississauga & Toronto

bluekeep exploits patch to protect cybersecurity

Microsoft Urges Users To Patch Windows To Defend Against BlueKeep Exploits

To protect yourself from ongoing BlueKeep exploit attacks, Microsoft urges users with systems running Windows 7, Windows Server 2008, and Windows Server 2008 R2 to update their operating systems. BlueKeep is a vulnerability with the ‘worm’ capability. This means that the malware can spread itself to other vulnerable computers on the network without additional input…
Read more
european airport infected with malware

European Airport Finds 50% of its Computers Infected With Malware

50% of the workstations at an international airport in Europe have been infected by a cryptomining malware. The breach was discovered by researchers from cybersecurity company Cyberbit. The researchers stated that they detected the malware due to abnormal activity of the PAExec tool and Reflective DLL Loading on the infected computers. What is cryptojacking? Cryptojacking…
Read more
businessman internal employee data breach

Employees Maliciously Cause Data Breaches at American Express and Yahoo

In two separate incidents, U.S. companies American Express and Yahoo have both been affected by data breaches of their clients’ personal information. Both attacks were the result of insider threats – a type of cyberattack caused by an internal person in the company. The American Express Incident American Express stated that data that was leaked…
Read more
hacking coding dangerous software vulnerabilities to be patched

The Most Dangerous Software Errors Have Been Identified

American Not-for-profit research organization MITRE has published their 2019 report for the “Top 25 Most Dangerous Software Errors”. In their report, MITRE placed buffer flaws and cross-site scripting at the top of their list. The CWE list of top 25 most dangerous software errors is a useful reference for software developers and cybersecurity professionals when…
Read more

What Is Malware and How Can You Stop It?

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls. There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user…
Read more
work-731198_960_720

3rd Party Programs: Are They Cybersecurity Weakpoints?

Almost 400 dental offices were infected with ransomware in a cyberattack this August. The computers became infected after DDS Safe, a 3rd party cloud backup software that all the affected offices were using, was compromised. The software was developed by Dental Technology Company PerCSoft. Affected offices had their computer files encrypted behind ransomwalls. On August…
Read more
technology icon gallery

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more
ransomware security keyboard

22 Governments in Texas Hit By First Coordinated Ransomware Attack

On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments. While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According…
Read more

Prnter_iot_device

Cyberattackers Are Targeting IOT Devices: How Do You Defend Yourself?

A new threat group, called “STRONTIUM”, was recently discovered by the Microsoft Threat Intelligence Center (MSTIC). In April 2019, this cyberthreat infiltrated private company networks through 3 different IoT devices – a VoIP phone, printer, and video decoder. The Microsoft researchers reported that the devices were compromised as a result of the devices running out-of-date…
Read more

cyber-security-1805246_960_720

106 Million Affected By Capital One Data Breach

In one of the largest financial data theft incidents in history, Capital One Financial Corporation reported on July 19th 2019 that around 106 million of its clients’ data was leaked due to cyberattack. Of the affected, 100 million are located in the U.S. and 6 million in Canada. Capital One announced that personal client information…
Read more