Coulson Technologies

Blog

Cybercriminals Confess: The Top 4 Tricks And Sneaky Schemes They Use To Hack Your Computer Network

Most cybercriminals love their jobs. They get to put their hacking skills to the test. In fact, many of them “compete” against one another to see who can hack into a network ...

Adobe Acquired Magento Marketplace Suffers Data Breach

Recently, the Magento Marketplace was acquired by Adobe and suffered a breach that exposed a limited amount of user data to an unknown third party. When Adobe discovered evidence of the breach, ...

Watch Out For Large Amounts of Scams This Holiday Season

The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber ...

Security Issues Found In Several VNC Applications

Microsoft RDP has its share of problems. That simple truth has sparked the rise of a number of open-source VNC (Virtual Network Computing) applications, which allow a user to remotely control another ...

New Cryptomining Malware Targets Windows Computers

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass ...

Google’s Cloud Print May Be Discontinued

Are you a fan of Google's Cloud Print service?  It's fantastic because it allows you to print from anywhere to anywhere, which makes it utterly invaluable. Like so many great services Google ...

New T-Mobile Data Breach Compromised Customer Info

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a ...

New Ransomware Called DeathRansom Hits The Scene

Early in 2019, a new strain of ransomware appeared.  Called "DeathRansom," its bark was initially much worse than its bite.  Researchers quickly discovered that the new strain only pretended to encrypt a ...

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

Zombieload is back.  First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor ...

Twitter Making Changes To Their Political Ad Rules

Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content.  The ...

Partners

Partner
Partner
Partner
Partner
Partner
Partner
Partner
Partner
Partner

Eliminate All Your IT Worries Today

Do you feel unsafe with your current security systems? Are you spending way too much on business technology? Do you feel like you’re not getting the best ROI? Contact the Coulson Technologies team today and we’ll address all your technology concerns over a free discovery call, so you can focus on the important business at hand.

Schedule Your Discovery Call Today