Blog

Ransomware Decrypt and Information

One of the most searched terms for ransomware is ransomware decrypt. There are several sites offering information on decrypting ransomware, but the one that seems to be the most supported is No More Ransom!. This site posts the latest decryption information, however, even with that, a majority of ransomware is unable to be decrypted. Paying ...

Fake SEO Plugin Compromises WordPress

A fake SEO plugin is making the rounds and compromising WordPress installations. The plugin is called WP-Base-SEO, and is a forgery of a legitimate search engine optimization plugin called WordPress SEO Tools. The plugin creates a backdoor allowing attackers to gain access to administrative functions. Read more about this fake WordPress plugin…

301 Redirect In WordPress FAQ

I am just trying to do a single 301 redirect from an old event page to the new one but it doesn’t seem to work. Do you have a good redirect plugin or method that you can recommend? We use the WordPress plugin called Redirection for basic 301 Redirects. However, we prefer Yoast Premium as it ...

Western Digital NAS Devices Compromised

Western Digital Corporation network-attached storage owners were warned of critical flaws in the company’s My Cloud line of hardware that exposed data stored on the devices to attack. The flaws impact a dozen Western Digital drives that could allow remote adversaries to bypass logins, insert commands, upload files without permission, and gain control of devices. Read ...

Dun & Bradstreet Compromises 33+ Million US Employees

Data aggregators like Dun and Bradstreet become suspect, even if they are not responsible for the breach. In this instance, data that was sold by Dun and Bradstreet has been collected and made public on the web. The database in question is US-centric, and contains information about employees of the Department of Defense, US Postal ...

New Email Scams

Over the past few years service providers like Microsoft, Facebook, Twitter, Paypal and others have stepped up their security game by contacting customers when they detect strange activities concerning users’ accounts. Consequently, there are more of these types of emails showing up in Email boxes. Scammers are taking advantage of these increased security messaging ...

Attorney Steven Tarshis New Website

Steven Tarshis, Esq. provides legal solutions and strategies in New Jersey and New York. Steven M. Tarshis, a graduate of Syracuse University College of Law, has been practicing law in New York and New Jersey since 1973. His experience and expertise make him an excellent choice for representation in many common areas of law, ...

CourseVector’s Email Archiving Services for Email Management

CourseVector’s Mail Store Email Management service offers an easy way to archive email, incoming and outgoing, for all email users, allowing for cost effective storage management, regulatory compliance, easy retrieval and more. Our Mail Store Service is designed to be self maintaining with little to no interaction on the part of the business/user. Why Archive ...

Ready to get started?