by Ophtek, LLC | Apr 18, 2023 | breach, Go Daddy, Hacking, malware, Ophtek, Web hosting
In an admission which will severely damage their reputation, web hosting force GoDaddy has revealed its servers were under attack for several years. With a userbase of 21 million users, GoDaddy is one of the major players when it comes to providing web hosting...
by Ophtek, LLC | Apr 11, 2023 | Google, google ads, malware, Online Security, Ophtek
Search engines are the gateway to the internet, but there’s a very real chance they may just be serving up malware each time you use them. We all use search engines on a daily basis – with Google being the most popular choice – and, to be honest, we probably...
by Ophtek, LLC | Apr 4, 2023 | Gambling, Gamers, IceBreaker, malware, Ophtek, social engineering
Social engineering has been a threat for some time, so threat actors have been looking for new ways to deceive PC users. And this is what IceBreaker does. A backdoor threat, IceBreaker is a new malware variant whose origins are currently unknown. However, regardless...
by Ophtek, LLC | Mar 28, 2023 | Ophtek, password manager, Password Security, Passwork Checkup, strong passwords
A password is one of the simplest and strongest ways to deliver high-strength IT security, but it’s also one which has the potential to cause great damage. We use passwords on such a regular basis that their presence has become the norm. Logging onto your PC in the...
by Ophtek, LLC | Mar 21, 2023 | Ophtek, PlugX malware, USB Drives, USB Malware
We all use USB devices daily, but these innovative and simple devices also make the perfect environment for the PlugX malware to take hold. USB devices are installed and ready to use within seconds of being plugged into a PC, a setup procedure which is a marked...
by Ophtek, LLC | Mar 14, 2023 | cookies, Google Authenticator, Ophtek, Phishing, Two Factor Authentication
Two-factor authentication (2FA) is there to provide a high level of security, but what happens when this process is compromised? CircleCI is a platform used by software developers to build, test and implement code. Therefore, due to the amount of confidential and...