Home

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!
SpaceBound Solutions Blog
A New form of Ransomware doesn’t want your Money, it wants a Good Deed
Jun 14

Jun 14 A New form of Ransomware doesn’t want your Money, it wants a Good Deed

Bob
Cybersecurity

In order to obtain a decryption key to unlock your files, GoodWill requires video proof of you completing three acts of kindness.

Experts Warn of Rise in Malware used to Hijack a User’s Browser
Jun 9

Jun 9 Experts Warn of Rise in Malware used to Hijack a User’s Browser

Bob
Cybersecurity

The malware has a few tricks up it’s sleeve, one being that it had the ability to redirect you away from the Chrome extensions page if you try to delete it

9 Rules to Follow for a Strong and Secure Password
Jun 7

Jun 7 9 Rules to Follow for a Strong and Secure Password

Bob
Cybersecurity

Following these 9 tips will help you ensure you have the strongest, most secure password possible

How Many Times is your Online Privacy Violated a Day?
Jun 2

Jun 2 How Many Times is your Online Privacy Violated a Day?

Bob
Cybersecurity

The amount might vary depending on certain variables, but the number of times your privacy is violated will shock you

How Game-Based Learning Prepares Students for the Future
May 31

May 31 How Game-Based Learning Prepares Students for the Future

Bob
Education

Introducing video games into your learning curriculum can teach kids about complex modern world problems

A World without Passwords: Coming Soon?
May 26

May 26 A World without Passwords: Coming Soon?

Bob
Cybersecurity

Apple, Google and Microsoft have all announced support of a method of authentication that avoids passwords

What the Baltimore County Public School District Learned from a Ransomware Attack
May 24

May 24 What the Baltimore County Public School District Learned from a Ransomware Attack

Bob
Cybersecurity

The attack shut the district down for three days. Now, they’re offering insight on how other districts can respond if they fall victim to an attack.

New “Data Safety” Section to be added to Google Play Store
May 19

May 19 New “Data Safety” Section to be added to Google Play Store

Bob
Cybersecurity

App developers have until July 20, 2022 to declare their apps’ functionality and data handling methods.

How Gamers can protect their Accounts from Getting Hacked
May 17

May 17 How Gamers can protect their Accounts from Getting Hacked

Bob
Cybersecurity, eSports, Gaming

Whether you’re just a casual gamer, or a popular streamer, its important to prioritize the security of your accounts

The Top 15 Most Exploited Software Vulnerabilities of 2021
May 12

May 12 The Top 15 Most Exploited Software Vulnerabilities of 2021

Bob
Cybersecurity

Some of the exploited software vulnerabilities come from companies like Microsoft, Apache and VMware.

T-Mobile becomes next Victim of Lapsus$ Hacking Group
May 10

May 10 T-Mobile becomes next Victim of Lapsus$ Hacking Group

Bob
Cybersecurity

Some of the mobile carriers’ source code was hacked, but they insist that there wasn’t “anything of value” compromised.

REvil Security Gang Back with Announcement of New Attacks
May 5

May 5 REvil Security Gang Back with Announcement of New Attacks

Bob
Cybersecurity

The announcement of the attacks - which came from a blog post - surprised many as REvil was forced offline in 2021 by law enforcement

Google suggests you Update Chrome Browser Immediately due to Security Flaws
May 3

May 3 Google suggests you Update Chrome Browser Immediately due to Security Flaws

Bob
Cybersecurity

The update fixes 30 security flaws, 7 of which were deemed “high level threats”.

5 Cybersecurity Mistakes you’re Making
Apr 28

Apr 28 5 Cybersecurity Mistakes you’re Making

Bob
Cybersecurity

Avoid making these 5 cybersecurity mistakes to keep your information safer online.

Leaked Documents Shed Light on how Okta, Sitel Reacted to Lapsus$ Breach
Apr 26

Apr 26 Leaked Documents Shed Light on how Okta, Sitel Reacted to Lapsus$ Breach

Bob
Cybersecurity

The documents include an “Intrusion Timeline”, that provides more detail behind the Okta attack.

Study Shows Organizations are more willing to Pay Ransom than Ever Before
Apr 21

Apr 21 Study Shows Organizations are more willing to Pay Ransom than Ever Before

Bob
Cybersecurity

According to the report, the number of organizations paying ransom is increasing, but so are payment amounts.

3 Ways School IT Teams can Better Manage Chromebooks
Apr 19

Apr 19 3 Ways School IT Teams can Better Manage Chromebooks

Bob
Education

Using these recommendations, school IT departments can better manage their school’s Chromebook fleet.

If you get a Text Message from Yourself, Do Not Answer
Apr 14

Apr 14 If you get a Text Message from Yourself, Do Not Answer

Bob
Cybersecurity

The text messages offer customers a “free gift” for paying their March bills

5 Types of Social Engineering Attacks and how to combat them
Apr 12

Apr 12 5 Types of Social Engineering Attacks and how to combat them

Bob
Cybersecurity

Here are five common social engineering attacks cybercriminals will use to compromise your information

National Spelling Bee Website Compromised by Cyber Attackers
Apr 7

Apr 7 National Spelling Bee Website Compromised by Cyber Attackers

Bob
Cybersecurity

In public filings, it was noted that roughly 54,800 emails were vulnerable in the attack

Load More

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!

Powered by Squarespace