Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

Mere months after the firmware in their computer chips was found to be seriously flawed, Intel’s flagship product has once again brought some unpleasant attention to the company. While the issue now has a fix, there was the possibility that a solution could depreciate the functionality of the CPU.

Continue reading
0 Comments

Don’t Be the Last to Learn of this LastPass Vulnerability

Don’t Be the Last to Learn of this LastPass Vulnerability

One of the major password managers out there, LastPass, has become the victim of a major vulnerability. Google researchers from the Zero Day Project discovered this, along with other flaws within LastPass.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Continue reading
0 Comments

Alert: Email Appearing to Be From Microsoft about Windows 10 Upgrade is Really Ransomware

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor many Windows users, the fact that Microsoft is issuing Windows 10 incrementally came as a shock for those who patiently waited for its release date. While users wait, however, hackers are taking advantage of those who are less patient by creating a ransomware that disguises itself as a launcher for a Windows 10 download. So, while you sit and wait for your version of the latest OS, don’t fall prey to deals that seem too good to be true.

Continue reading
0 Comments

CryptoLocker and GameOver Zeus: When Bad Meets Ugly

b2ap3_thumbnail_alert_malware_400.jpgIt's been a few weeks since we've reported on the GameOver Zeus virus, and a few months since we first told you about the nasty ransomware known as Cryptolocker. Now, we're seeing the two threats merge into one code-red-mega threat that your business needs to be prepared for!

Continue reading
0 Comments

Alert: New Botnet Thunders Into View For Windows Users

b2ap3_thumbnail_go_zeus_400.jpgGameOver Zeus, a member of the Zeus family of malware, has been discovered and disrupted by the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice. But, this is only a temporary respite from the danger the malware poses - in two weeks, the threat will be back, and very much alive.

Continue reading
0 Comments

Ebay Hacked - Hold Onto Your Shopping Cart (And Your Password)!

b2ap3_thumbnail_ebay_400.jpgeBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.

None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.

Continue reading
0 Comments

New iPhone Vulnerability: Lock Screen Can Leak Your Contacts!

b2ap3_thumbnail_ios_siri_400.jpgThink your data is safe when you lock your phone? Thanks to a newly discovered vulnerability with iOS 7.1.1 (the latest version), a hacker has the ability to bypass your lock screen and easily access your contact information.

Continue reading
0 Comments

DANGER! Vulnerability in Internet Explorer Not Patched Yet, No Fix for XP

b2ap3_thumbnail_alert_one_400.jpgInternet Explorer is one of the most used web browsers. Despite this, there have been various security problems with it, and another one has just been found - a zero-day vulnerability that leaves IE users at the mercy of hackers. We will cover what you need to know to keep your business safe.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DeviceswindowsIT ServicesHardwareComputerUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationBusiness ContinuityGadgetsCommunicationSmartphoneAppsProductivityVoIPDisaster RecoveryNetworkBrowserMicrosoft OfficeServerMobile Device ManagementSmall BusinessTech TermMobile ComputingInformation TechnologyAndroidQuick TipsPasswordsHealthSocial MediaOperating SystemMobile OfficeData BackupGoing GreenCybersecurityHolidayChromeCybercrimecommunicationsAppApplicationOfficeAlertBest PracticeOffice 365CollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipBYODMarketingData SecurityLaw EnforcementManaged IT ServicesAppleUsersThe Internet of ThingsVendor ManagementWiFiInternet of ThingsTabletSearchRemote ComputingWearable TechnologyRouterPhishingWireless TechnologyMoneyBDRIT SupportHistoryFacebookUser ErrorBring Your Own DeviceRemote MonitoringAntivirusUnified Threat ManagementiPhoneAvoiding DowntimeMobilityRisk ManagementCost ManagementMaintenanceSaving TimeHackingBig DataData ManagementComputersEncryptionSocialCustomer Relationship ManagementTelephone SystemsOneNoteGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportUnsupported SoftwareGmailUSBPowerPointCloud ComputingNetworkingAnalyticsWi-FiProactive ITVulnerabilityFirewallBudgetLithium-ion batteryGoogle DriveCurrent EventsPhone SystemArtificial IntelligenceAutomationVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralitySocial NetworkingWirelessPrinterShortcutOutlookVirusTravelWork/Life BalanceadministrationSocial EngineeringMobile DeviceDisasterStreaming MediaPoliticsTrendingAuditIntranetRecoveryLaptopAugmented RealityContent FilteringApplicationsManaged ITIT COnsultantPersonal InformationComputer RepairBlockchainEducationTelevisionRetailExcelIdentity TheftInformationManaged IT ServicesGoogle AssistantMeetingsUninterrupted Power SupplyhackerTelephonySalesCustomer ServiceHard DriveComputingBiometricsPrivate CloudVirtual RealityManaged ServiceDevicesLegalHIPAATransportationEnd of SupportInternet ExlporerCommercePatch ManagementFlexibilityHuman ResourcesDDoSInstant MessagingEmailsFraudGoogle DocsWindows 8Online CurrencyScamSportsBusiness TechnologyEntertainmentData StorageBenefitseWasteComputer AccessoriesWireless ChargingAccess ControlMobile SecuritySaaSValueWannaCryData BreachPoint of SaleProject ManagementPrinter ServerTouchscreenCortanaHaaSEvernoteSamsungProgrammingManaging StressTwitterBatteryStorageDisplayAutomobileAmazonCleaningPaperless OfficeHosted SolutionSave TimeData ProtectionFax ServerComputer CareWordBusiness IntelligenceEbaySolid State DriveConferencingWorker CommuteAdministratorSoftware as a ServiceSettingsDevice SecurityKeyboardIT ManagementWindows InkVideo GamesBuisnessHyperlinkComputer ForensicsHard Disk DriveGiftsAccessRunning CableWebinarImagesHiring/FiringWIndows Server 2008Google MapsWasting TimeNear Field CommunicationProactiveManagementCredit CardsVendor3D PrintingSpywareSmart TechnologyWebsitesData LossSurge ProtectorAccessoryIT consultingWireless InternetFAQRobotSyncAdvertisingDebateEmployee-Employer RelationshipHelp DeskReliable ComputingData TheftScalabilityPeripheralDistributed Denial of ServiceGamificationComplianceiOSChargerExperienceData storagePDFBloatwareEdgeApp storeUpgradesMicrosoft ExcelHow ToMemoryInbound MarketingComputer FanMusicCommunityEmployer Employee RelationshipAdobeText MessagingFilesTestingScreen MirroringCiminalISPConsultantFile SharingBrandingTouchpadIntrantetMouseFinancialBooksLifestyleChromecastCameraCastAdminWIndows 7IdentityBloggingTutorialBlack MarketNetwork CongestionHybrid CloudMonitorsElectronic Medical RecordsLicensingProjectsRegulationsIT budgetKeyboard ShortcutsData PrivacyWebinarLegislationBluetoothOperating SysytemVirtual AssistantjunkNanotechnologyWorkersSafetyCo-managed ITTrainingTabletsWindows 7CamerasPayrollUserChromebookIT solutionsComparisonNokiaSharePointGift GivingAlexa for BusinessfilterRoot Cause AnalysisUpdatesHBOCompany CultureNFLYoutubeVirtual DesktopCo-Managed ServicesPresentationIdentitiesSecurity CamerasOneDriveBest AvailablePrintingWindows 10sSpecificationsPrint ServerTeamworkReputationMicrobloggingScienceMicrosoft WordTelephoneLanguageMachine Learning