Home

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!
SpaceBound Solutions Blog
Malicious Chrome Extensions removed from Chrome Web Store
Sep 15

Sep 15 Malicious Chrome Extensions removed from Chrome Web Store

Bob
Cybersecurity

A combined 1.4 users downloaded the extensions before they were removed from the Web Store

New Strains of Ransomware cause Number of Attacks to Spike
Sep 13

Sep 13 New Strains of Ransomware cause Number of Attacks to Spike

Bob
Cybersecurity

The number of ransomware cases jumped 47%, thanks to new strains infecting their targets

Google Discovers Iranian Hacking Tool that Steals Data from Email Accounts
Sep 8

Sep 8 Google Discovers Iranian Hacking Tool that Steals Data from Email Accounts

Bob
Cybersecurity

The tool, which steals user data, also deletes a warning email from Google notifying the user of a suspicious login.

Expert creates Raspberry Pi-powered Tool that can Track whether you’re being followed
Sep 6

Sep 6 Expert creates Raspberry Pi-powered Tool that can Track whether you’re being followed

Bob
Technology

The tool scans for devices within a certain time limit, and alerts you when devices are spotted multiple times

New Malware is being developed to Bypass Android Security Features
Sep 1

Sep 1 New Malware is being developed to Bypass Android Security Features

Bob
Cybersecurity

The new vulnerability is used to find ways to work around Google Play security protections

Robotexts are Gaining Popularity with Scammers
Aug 30

Aug 30 Robotexts are Gaining Popularity with Scammers

Bob
Cybersecurity

Estimates show that consumers received over 12 billion robotexts in June alone

The “Disturbing Trend” in Software Patches – and how it’s being addressed
Aug 25

Aug 25 The “Disturbing Trend” in Software Patches – and how it’s being addressed

Bob
Cybersecurity

ZDI released new guidelines in hopes to initiate improvements needed to handle important software flaws

How Organizations can secure their IoT Devices
Aug 23

Aug 23 How Organizations can secure their IoT Devices

Bob
Cybersecurity

Here are steps IT teams can take to secure the IoT devices in their network

These are the most Impersonated Apps used in Malware Attacks
Aug 18

Aug 18 These are the most Impersonated Apps used in Malware Attacks

Bob
Cybersecurity

Hackers are impersonating famous apps in hopes they’ll conduct a successful social engineering attack

Recent Social Media Attack Exposes User Data on the Dark Web
Aug 16

Aug 16 Recent Social Media Attack Exposes User Data on the Dark Web

Bob
Cybersecurity

The compromised database exposed the accounts of 5.4 million Twitter users

Malware-Infested Apps Removed from Google Play Store
Aug 11

Aug 11 Malware-Infested Apps Removed from Google Play Store

Bob
Cybersecurity

The malware has infected apps that total over 3 million installs through the store

New Malware Discovered can turn a Simple Google Search into Possible Ransomware
Aug 9

Aug 9 New Malware Discovered can turn a Simple Google Search into Possible Ransomware

Bob
Cybersecurity

A specific Google search prompts an ad to be displayed at the top of the results page that could really mean trouble for even the most careful user

BlackCat Ransomware may become much more dangerous
Aug 4

Aug 4 BlackCat Ransomware may become much more dangerous

Bob
Cybersecurity

BlackCat Ransomware added a new tool to its arsenal that will cause it to become much more dangerous

Log4j labeled an “Endemic Vulnerability” that could persist for Years to Come
Aug 2

Aug 2 Log4j labeled an “Endemic Vulnerability” that could persist for Years to Come

Bob
Cybersecurity

According to a report released the Cyber Safety Review Board, “significant risk remains” with Log4j

New Apple Feature aims to protect High-risk Users from Spyware Attacks
Jul 28

Jul 28 New Apple Feature aims to protect High-risk Users from Spyware Attacks

Bob
Cybersecurity

Apple acknowledges that the feature is “extreme” and only applies to a small percentage of their users

Cyber Command asks Private Sector to Share Intelligence to Aid in Digital Defenses
Jul 26

Jul 26 Cyber Command asks Private Sector to Share Intelligence to Aid in Digital Defenses

Bob
Cybersecurity

Using “hunt forward” operations, Cyber Command has been able to gather “unique insights into adversary malware”

U.S. Healthcare Organizations are being targeted by North Korean Ransomware
Jul 21

Jul 21 U.S. Healthcare Organizations are being targeted by North Korean Ransomware

Bob
Cybersecurity

In a joint statement, cybersecurity and intelligence agencies warn that the ransomware has been targeting U.S. healthcare entities since May 2021.

Alleged Hack of Chinese Police Database leaves 1 Billion Exposed
Jul 19

Jul 19 Alleged Hack of Chinese Police Database leaves 1 Billion Exposed

Bob
Cybersecurity

If the leak is confirmed, it would be one of the largest data breaches in history

New Mozilla Firefox Privacy Feature Stops URLs from tracking you
Jul 14

Jul 14 New Mozilla Firefox Privacy Feature Stops URLs from tracking you

Bob
Cybersecurity

The setting removes parts of a URL that is used to track you around the web

Content Creators Targeted with Malware that gathers YouTube Channel Information
Jul 12

Jul 12 Content Creators Targeted with Malware that gathers YouTube Channel Information

Bob
Cybersecurity

Some of the information gathered by the malware includes name of channel, number of subscribers and more

Load More

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!

Powered by Squarespace