Latest News & Blog Articles

Read our latest news!
Image of an android device.

Researchers have discovered a new Android vulnerability that could allow malware to pose as popular apps and ask for various permissions, potentially allowing hackers to listen in on users, take photos, read and send SMS messages, and basically take over various functions as if they are the device’s owner.   Security researchers John Høegh-Omdal, Caner Kaya and Markus Ottensmann at Norwegian app-security provider Promon discovered the flaw—which...

Read More
Image of a check list.

Keeping your businesses data secure is extremely important especially when 2020 is around the corner. Here are some cyber security steps on what should be done to help keep your data secure and prevent any cyber attacks from occurring within your business.   Mail Filtering Mail filtering is the first step in the right direction when it comes to keeping your business secure. We follow our 3-layered security...

Read More
Image of a fax to email diagram.

Fax to email has been one of the most loved features of 3CX.  It allows all inbound faxes to be sent to a mailbox removing the need to have a physical fax machine to just receive faxes. It can also help reduce the amount of paper that is being used so you can only print things that you know you really need.   Interested in using Fax...

Read More
Image of outlook on a mobile device.

Users of the Microsoft Outlook for Android app should update their apps to avoid a range of attacks.   The bug (CVE-2019-1460) would allow an attacker to perform cross-site scripting (XSS) attacks on the affected systems and run scripts in the security context of the current user, according to Microsoft’s advisory on the bug. XSS occurs when malicious parties inject client-side scripts into web pages, which trick...

Read More
Wordpress logo

The Wordfence Threat Intelligence team recently identified multiple critical vulnerabilities in the commercial Total Donations plugin for WordPress. These vulnerabilities, present in all known versions of the plugin up to and including 2.0.5, are being exploited by malicious actors to gain administrative access to affected WordPress sites.   It is our recommendation that site owners using Total Donations delete–not just deactivate–the vulnerable plugin as soon as possible to...

Read More
Image of 3CX Click to Call.

3CX Click to call allows you to easily dial numbers from any page of your web browser with just one click. It is also able to work on many CRM platforms such as Sales Force. You can configure it to use the webclient or the softphone. Using the webclient will open a new tab with a keypad. The keypad will have the number you have...

Read More
Google Play Store

Google has kicked 24 apps off of its official Android app marketplace after spyware was discovered in them.   A new spyware has been making the rounds in Android apps on Google Play, infecting victims post-download to steal their SMS messages, contact lists and device information. In addition to stealing victims’ information, the malware also stealthily signs them up for premium service subscriptions that could quietly drain...

Read More
Data Breach

Over 50,000 university students have had their private data breached as part of a significant incident at payment and ticketing platform Get. Get, which services student clubs running events throughout the country, had left the names and contact details of customers visible through its interfaces for an unknown period before a user discovered the error on Saturday. While the company has since blocked off access to this...

Read More
3CX Mobile application.

The 3CX mobile app is perfect for your business if you have workers that are always out on the road. It allows users to take their office extension anywhere they go around the world. All they need is an active internet connection. The app is available for iOS and Android and requires you to have the 3CX phone system. The 3CX mobile app allows you...

Read More
Image of a locked pc with chains.

Attackers continue to push the boundaries with modular trojans and ransomware attacks, a new report found.   With the number of unique cyberincidents continuing to grow, ransomware-based attacks in particular are on the rise in 2019, researchers said.   Ransomware trojan-based infections jutted up from 9 percent in the fourth quarter of 2018 to 24 percent in the first quarter of 2019, said Positive Technologies researchers in their Cybersecurity...

Read More