• (919) 519-1227
  • info@ctgint.us
  • 1903 North Harrison Avenue, Suite 200 Cary, NC 27513. United States

Blogs

FBI warns about ongoing Google Voice authentication scams

The Federal Bureau of Investigation (FBI) says Americans who share their phone number online are being targeted by Google Voice authentication scams. As the federal law enforcement agency explains, the fraudsters are targeting those who have posted their phone number as a form of contact when trying to sell various items on online marketplaces or social media apps. “Recently, we…

Read More

Oduwacoin partners with Crypto.com!

ODUWACOIN RSS FEED INTEGRATED WITH CRYPTO.COM’S PRICE PAGE  Through Crypto.com’s Oduwacoin price page, you can now directly access Oduwa’s RSS news feed. This feature will enable Crypto.com users to obtain the latest news and updates on Oduwacoin. Oduwacoin is an autonomous decentralized cryptocurrency that serves as a medium of exchange to settle transactions for People of African descent and minorities worldwide….

Read More

Massive attack against 1.6 million WordPress sites underway

Wordfence analysts report having detected a massive wave of attacks in the last couple of days, originating from 16,000 IPs and targeting over 1.6 million WordPress sites. The threat actors target four WordPress plugins and fifteen Epsilon Framework themes, one of which has no available patch. Some of the targeted plugins were patched all the way back in 2018, while others…

Read More

Security holes discovered in 9 popular routers – is yours on the list?

Keeping a close eye on your online accounts is incredibly important with scams, hacks, and breaches as common as they are. Your hardware is at risk as well, which is why we always recommend keeping your devices updated. In fact, one of the most indispensable devices in your home can also be one of the most vulnerable. Cyber Security researchers recently examined a…

Read More

AT&T Customers Are Being Infected By A Massive Malware Botnet But User Data Is Allegedly Secure

If you are an AT&T enterprise customer with some older technology on the edge of your network, your infrastructure may be under attack by a Russian botnet dubbed EwDoor. In late October this year, researchers at 360 Netlab discovered a threat actor attacking Edgewater Networks’ devices using the four-year-old CVE-2017-6079. This vulnerability, when exploited, could allow the attacker to…

Read More

Nine WiFi routers used by millions were vulnerable to 226 flaws

WiFi routers

Security researchers analyzed nine popular WiFi routers and found a total of 226 potential vulnerabilities in them, even when running the latest firmware. The tested routers are made by Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology, and Linksys, and are used by millions of people. The front-runners in terms of the number of vulnerabilities are the TP-Link Archer AX6000,…

Read More

These are the worst passwords of 2021, so stop using them ASAP

Picking a strong password is more important than ever, but it’s also becoming increasingly difficult. Cybercriminals are constantly picking up new tricks, and it is nearly impossible to stay ahead of them. To make matters worse, some of us aren’t even trying. For the past several years, the team behind the password manager NordPass has been putting together lists of…

Read More

Hackers deploy Linux malware, web skimmer on e-commerce servers

Security researchers discovered that attackers are also deploying a Linux backdoor on compromised e-commerce servers after injecting a credit card skimmer into online shops’ websites. The PHP-coded web skimmer (a script designed to steal and exfiltrate customers’ payment and personal info) is added and camouflaged as a .JPG image file in the /app/design/frontend/ folder. The attackers use this script…

Read More

PRIVACY REPORT: WHAT ANDROID DOES IN THE BACKGROUND

We’ve come a long way from the Internet of the 90s and early 00s. Not just in terms of technology, capabilities, and culture, but in the attitude most of us take when accessing the ‘net. In those early days most users had a militant drive to keep any personal or identifying information to themselves beyond the occasional (and often…

Read More

Hackers are stealing 2FA codes with terrifyingly effective voice bots

Every time a massive data breach makes the news, we remind you about the best practices you need to employ to protect your online properties. You should never use weak passwords and recycle them. Instead, pick a password manager that lets you generate unique passwords for every different service, website, and app. And use two-factor authentication (2FA) or one-time passwords (OTP) whenever you…

Read More