fbpx

Technology

The Wordfence Threat Intelligence team recently identified multiple critical vulnerabilities in the commercial Total Donations plugin for WordPress. These vulnerabilities, present in all known versions of the plugin up to and including 2.0.5, are being exploited by malicious actors to gain administrative access to affected WordPress sites.   It is our recommendation that site owners using Total Donations delete–not just deactivate–the vulnerable plugin as soon as possible to...

Read More

3CX Click to call allows you to easily dial numbers from any page of your web browser with just one click. It is also able to work on many CRM platforms such as Sales Force. You can configure it to use the webclient or the softphone. Using the webclient will open a new tab with a keypad. The keypad will have the number you have...

Read More

Google has kicked 24 apps off of its official Android app marketplace after spyware was discovered in them.   A new spyware has been making the rounds in Android apps on Google Play, infecting victims post-download to steal their SMS messages, contact lists and device information. In addition to stealing victims’ information, the malware also stealthily signs them up for premium service subscriptions that could quietly drain...

Read More

Over 50,000 university students have had their private data breached as part of a significant incident at payment and ticketing platform Get.   Get, which services student clubs running events throughout the country, had left the names and contact details of customers visible through its interfaces for an unknown period before a user discovered the error on Saturday.   While the company has since blocked off access to this...

Read More

The 3CX mobile app is perfect for your business if you have workers that are always out on the road. It allows users to take their office extension anywhere they go around the world. All they need is an active internet connection. The app is available for iOS and Android and requires you to have the 3CX phone system. The 3CX mobile app allows you...

Read More

Attackers continue to push the boundaries with modular trojans and ransomware attacks, a new report found.   With the number of unique cyberincidents continuing to grow, ransomware-based attacks in particular are on the rise in 2019, researchers said.   Ransomware trojan-based infections jutted up from 9 percent in the fourth quarter of 2018 to 24 percent in the first quarter of 2019, said Positive Technologies researchers in their Cybersecurity...

Read More

Below is a video about how to make web meetings on 3cx. Web meetings with 3cx are easy and work well with anyone because they don't require everyone in the meeting to have 3cx. It can support conferences with up to 250 people. Meetings can also be scheduled beforehand and emails get sent out with a link to every attendee. [embed]https://youtu.be/r2ehXDgo6Nk[/embed] To register a demo Click here! Click here...

Read More

National Australia Bank says 13,000 customers are being contacted after a breach where personal data was uploaded without permission to two data service companies.   Australia’s fourth-largest bank said yesterday that the breach was not a cybersecurity issue, adding that no log-in details or passwords were compromised.   “The issue was human error and in breach of NAB’s data security policies,” Chief Data Officer Glenda Crisp said in a...

Read More

A researcher earned a $30,000 bug bounty from Facebook after discovering a weakness in the Instagram mobile recovery process that would allow account takeover for any user, via mass brute-force campaigns.   Independent researcher Laxman Muthiyah took a look at Instagram’s mobile recovery flow, which involves a user receiving a six-digit passcode to their mobile number for two-factor account authentication (2FA). So, with six digits that means...

Read More

Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector.   Vulnerabilities in the way Bluetooth Low Energy is implemented on devices by manufacturers can open the door to global device tracking for the Windows 10, iOS and macOS devices that incorporate it, according to research from Boston University.   An academic team at BU uncovered the...

Read More
})(jQuery)