Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

Net Neutrality: Everything Business Owners Need to Know [VIDEO]

Net Neutrality: Everything Business Owners Need to Know [VIDEO]

There has been a lot of buzz about the term net neutrality in the news, on social media, and around the water cooler lately. The FCC is preparing to end net neutrality on December 14th, 2017, and it’s causing a major stir. From activist groups encouraging people to call congress with their concerns, to headlines exclaiming that the Internet as we know it is dying, there is a lot to sift through to really understand what the stakes are. Our goal is to make sense of net neutrality without the sensationalism, and explain how it can affect small business owners.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Tip of the Week: Today is National Clean Out Your Computer Day. 5 Ways to Show Your PC Some Love

Tip of the Week: Today is National Clean Out Your Computer Day. 5 Ways to Show Your PC Some Love

It’s National Clean Out Your Computer Day! To kick off this important day, we’d like to remind business owners that this is a valuable opportunity to make sure that you’re taking good care of one of your greatest assets: your company’s technology. Let’s go over some of the best ways that you can optimize the performance of your office computers.

0 Comments
Continue reading

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

0 Comments
Continue reading

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

If you have the most recent addition to Samsung’s growing collection of smartphones, we hope you haven’t grown too attached to it. The company is recalling the Galaxy Note 7 on reports that the batteries explode. This event is largely considered one of the more high-profile recalls in the history of consumer technology.

0 Comments
Continue reading

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

0 Comments
Continue reading

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

0 Comments
Continue reading

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

In the latest round of security patches released by Microsoft, 27 vulnerabilities were fixed. Affected software includes major titles like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s imperative that you apply these security patches as soon as you can, or else your system will be exposed to some serious threats.

0 Comments
Continue reading

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

0 Comments
Continue reading

This Move By Google Spells Doom for Adobe Flash

This Move By Google Spells Doom for Adobe Flash

In light of a recent zero-day vulnerability discovered with Adobe Flash, along with the wide adoption of the alternative rich media player HTML5, Google has put into motion plans to stop supporting Flash for its popular web browser, Google Chrome. By all accounts, this move may be the final nail in the coffin for the Internet stalwart, which means that your business should cease using it.

0 Comments
Continue reading

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

0 Comments
Continue reading

Alert: Malware Locks Up Your PC and Offers Fake Tech Support Phone Number

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

0 Comments
Continue reading

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

0 Comments
Continue reading

Windows 10 Is Here - Everything Your Business Needs to Know

b2ap3_thumbnail_windows_10.pngMicrosoft’s latest PC operating system arrived with fanfare yesterday, and has received overwhelmingly positive reviews so far, but is it ready for your business? Let’s take it for a spin and find out.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Business Computing Microsoft Computer Hosted Solutions Google Network Security Internet Productivity Tech Term Software Communication Mobile Devices Efficiency IT Services Data Small Business Backup Ransomware Workplace Tips Windows 10 Hardware Smartphone Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Data Management Browser Business Continuity Data Recovery Managed IT Services Innovation Data Backup Facebook Office 365 Server Users Upgrade Internet of Things Word Managed IT Services Windows Gmail Passwords Smartphones Disaster Recovery Phishing Social Media Outsourced IT App Windows 10 Network Chrome Vulnerability Cybersecurity communications Business Management Remote Monitoring Managed Service Provider VoIP Artificial Intelligence Employer-Employee Relationship Mobile Device Encryption Managed Service Hacker Tip of the week Applications Information Content Filtering Save Money Big Data Miscellaneous Apple Spam Government Website Analytics IT Support BYOD Infrastructure Money Office Tips Access Control Virtual Reality WiFi Settings Router Paperless Office Tablet Two-factor Authentication Avoiding Downtime The Internet of Things Antivirus Bandwidth Virtualization YouTube Education Risk Management Data storage Wireless Display IT Management Robot Customer Service Printing Firewall Maintenance Employee-Employer Relationship Automation HIPAA Quick Tips Safety End of Support Computing Presentation Scam Downtime Google Drive Password Office Mouse Vendor Management Solid State Drive Hosted Solution SaaS Gadgets Development Wireless Technology Networking LiFi Mobile Security Recovery Holiday Hard Disk Drive VPN Computers Unified Threat Management Data Security Search Storage Retail Data loss Business Technology IBM Virtual Private Network Chromebook Mobile Device Management Administration Customer Relationship Management Server Management Apps Outlook Touchscreen Business Intelligence Wi-Fi Document Management Monitors Hacking Laptop Telephone Systems Augmented Reality Company Culture Operating System User Error Recycling Human Error Halloween Budget Training FCC Uninterrupted Power Supply Smart Tech Patch Management Students Cortana Cryptocurrency How To G Suite Distributed Denial of Service Bluetooth MSP Scalability Fun Bring Your Own Device sip Automobile Alerts Service Level Agreement Comparison Managing Stress Managed Services Undo Fraud Corporate Profile Internet Exlporer PowerPoint SharePoint VoIP eWaste Marketing Device Scary Stories Title II Connectivity Bitcoin Network Congestion LED Application IP Address Cybercrime Information Technology Managed IT Service Modem Migration Best Practice telephony Licensing How To Writing Remote Computing Specifications IT service Compliance Heating/Cooling Cables Laptops Google Docs WannaCry Value Onboarding Downloads IT Technicians Time Management Continuity Mobility Sports Online IoT Slack Knowledge Windows 8 Update Cooperation Firefox Smart Office Co-Managed IT Mobile Office Google Wallet Break Fix Cabling Cookies Charging Business Growth Current Events Black Friday BDR Regulations Servers Wires Software as a Service Digital Payment Hotspot Professional Services Digital Signage Multi-Factor Security Mirgation Network Management Solar Print Toner Hard Drives Legal Politics Microsoft Excel Star Wars Monitoring Experience Unified Communications Staff Techology Work Content Running Cable Drones Dark Web Nanotechnology Managed IT Messaging Alt Codes Dark Data Collaboration Going Green Social Engineering Cyber Monday Google Maps Social Networking Voice over Internet Protocol Entertainment Virtual Desktop Language Digital USB Lenovo Desktop Google Calendar Chatbots Shortcuts Refrigeration Buisness Tech Support Blockchain Cost Management Mail Merge Spying User Social Printer Wearable Technology Unified Threat Management Optimization Streaming Lithium-ion battery Computer Care Net Neutrality Disaster Screen Reader Shortcut Analysis Employee-Employer Relationships Public Speaking IT solutions Typing File Sharing Samsung Smart Technology Motherboard Statistics FinTech iOS Competition Deep Learning Humor Computing Infrastructure Spyware Dongle Superfish Troubleshooting Legislation Identity Security Cameras 5G Websites Identity Theft Permissions Assessment Address Hacks Mobile Data Law Enforcement Travel Printers Notifications CrashOverride Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Mobile Computing Web Server Machine Learning IT Budget Emergency Physical Security GPS Upgrades IT Consultant Windows 7 Computer Repair Processors Cameras Relocation Meetings Tracking 3D Printing Cleaning Regulation Domains Health Alert CCTV Private Cloud Emoji Webcam Unsupported Software Work/Life Balance Electronic Medical Records Error Black Market Point of Sale