CTTS, Inc.

Blog

Three Give-Aways that Your Security Approach Needs a Change

It only makes sense that you would want only the best security for your organization. It’s natural to want to ...

Major Server Ring Distributing Malware Taken Down

Score one for the good guys.  A researcher from BrilliantIT was recently able to figure out how infected computers would connect to EITest's command and control server, and using that information, ...

Tech Term: Modems and Routers Defined

The Internet is an amazing tool, only bolstered by our ability to access it wirelessly - but what ...

Hacked Routers Being Used To Spread Malware

Beware of compromised routers spreading malware.  This is according to both Kaspersky Labs and a recently released government report. Using hacked routers to spread malware is nothing new.  Security insiders have ...

Google Wants Children Watching YouTube Kids App

More often than not, Google is seen as a force for good on the internet. However, in one area in particular, their actions and words haven't been in alignment, and it's ...

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that ...

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  ...

Be Careful, Searches May Provide False Download links

If you're downloading software from the web, be careful.  Take the extra step of verifying that you're on the developer's website, because the hackers have a new trick up their sleeve.  ...

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Nearly every brand of browser offers some of supposedly covert browsing options. Google Chrome has Incognito mode, Microsoft Edge ...

Panera Bread Customer Accounts Exposed To Threats

Panera Bread company is the latest to find itself in hot water.  Recently, security researcher Dylan Houlihan discovered that the company had failed to encrypt (or otherwise protect) a file containing ...

Contact

CTTS, Inc.CTTS, Inc. Logo $$$
  • 557 S. Interstate 35
    Suite 201

    Georgetown, TX 78626
  • Phone: (512) 388-5559
  • Phone: (512) 388-5559

Technology Tips

Protect your business from the latest threats with our weekly Tech Tip Tuesday articles, written by our own Team of experts!

Sign Me Up!