Contact us today!
(954) 575-3992
facebook linkedin Business Solutions & Software Group RSS Feed

Business Solutions & Software Group Blog

Business Solutions & Software Group has been serving the Coral Springs area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Continue reading
0 Comments

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

Alert: Apple OS X Now at Risk of Ransomware

Ransomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Continue reading
0 Comments

Study: 2015 Saw a 27.3% Increase In New Malware

b2ap3_thumbnail_malware_everywhere_400.jpgCyber security continues to be a major pain point for small and medium-sized businesses, even if they’re taking the fight to the latest threats with solutions like antivirus and firewalls. Significant progress has been made, yet new threats are born every day. In fact, you might be surprised to find out that a monstrous 27.3 percent of all malware in the world was created just last year. 

Continue reading
0 Comments

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpgAny business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

Continue reading
0 Comments

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

Continue reading
0 Comments

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpgATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

Continue reading
0 Comments

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

Continue reading
0 Comments

Warning: CryptoWall Targets Businesses and It’s Just as Nasty as Its Cousin, CryptoLocker

b2ap3_thumbnail_cryptowall_400.jpgIn the wake of a ransomware takeover, it seems like the world can’t go a few months without some sort of data loss disaster occurring. The antics of hackers grow more dangerous and difficult to dodge, and IT departments have their hands full dealing with the fallout. What’s keeping you from contracting this ransomware, and how can you keep your business from suffering its consequences?

Continue reading
0 Comments

Dyre Wolf Malware Bleeds Businesses of $1.5 Million Per Hack

b2ap3_thumbnail_dyre_wolf_phishing_400.jpgWith spring arriving, “winter is coming” as the new season of the critically-acclaimed television series Game of Thrones returns to millions of viewers worldwide. Ironically, there’s also a type of malware gaining traction in the online community that matches its bark with its bite, aptly dubbed Dyre Wolf. This threat has the potential to cost businesses as much as $1.5 million per hack, and takes advantage of the ever-common spear phishing tactic.

Continue reading
0 Comments

How to Delete the Smelly Superfish App From Your Computer

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

Continue reading
0 Comments

The Threat Level for BadUSB Malware has Increased

b2ap3_thumbnail_badusb_is_dangerous_400.jpgThis past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

Continue reading
0 Comments

Tip of the Week: Here are 4 Signs to Catch APT Hackers In the Act

b2ap3_thumbnail_apt_hack_400.jpgWorking with technology can get pretty complicated and technical at times. We're here to help. We've got plenty of technology tips to share with the world, and we're going to unleash them on you once a week. For more helpful tech tips, search our previous blog articles. This week's tip will help you spot a nasty APT hack on your company's network.

Continue reading
0 Comments

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

Continue reading
0 Comments

Malware BadUSB Challenges Our Dependency on USB Technology

b2ap3_thumbnail_usb_malware_400.jpgYour office is likely full-to-bursting with devices utilizing USB technology. It's been a popular way to connect external devices to PCs since the 1.1 version was released in 1998. However, it may be the technology's popularity that will cause its downfall as hackers develop ways to use the device to their advantage.

Continue reading
0 Comments

Hackers Want to Keep You in the Dark

b2ap3_thumbnail_hackers_want_to_take_everything_400.jpgWhen it comes to hackers, they are shrouded in darkness and treachery. They lurk in the shadows, waiting for us to make a mistake and to steal our life savings, or other equally nefarious things. But there are a few assumptions that they make concerning their prey, and they wish to hide these from us at all costs.

Continue reading
0 Comments

Alert: Cryptolocker Threat Returns with a Vengeance!

b2ap3_thumbnail_warning_malware_400.jpgTwo weeks ago, the National Communications Administration managed to weaken a set of malware designed to steal banking and personal credentials from unsuspecting users. They warned the world that GameOver Zeus and Cryptolocker ransomware would be back with a vengeance, and that immediate action could prevent a whole lot of pain later.

Continue reading
0 Comments

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

Continue reading
0 Comments

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Business Solutions & Software Group!

Read more...

Contact Us

Learn more about what Business Solutions & Software Group can do for your business.

callphone

Call us today    (954) 575-3992

10211 W Sample Road
Suite 114
Coral Springs, Florida 33065

facebook linkedin #