CT Business Solutions Huntsville - Blog


PC Running slow? 100% guaranteed increase!

Posted on: 08/14/2018 | by: cthuntsville

Our new product called Fresh Start will give you the feel of a new PC! EVEN if it’s 8 years old! Ask us how we guarantee your PC speed will increase AND running better than new. Computer Troubleshooters Fresh Start   Request an Assessment

Continue Reading

SamSam Ransomware Crew Made Nearly $6 Million From Ransom Payments

Posted on: 08/01/2018 | by: cthuntsville

Courtesy: Catalin Cimpanu July 31, 2018 The SamSam ransomware has earned its creator(s) more than $5.9 million in ransom payments since late 2015, according to the most comprehensive report ever published on SamSam’s activity, containing information since the ransomware’s launch in late 2015 and up to attacks that have happened earlier this month. Compiled by […]

Continue Reading

Massive Malvertising Campaign Discovered Attempting 40,000 Infections per Week

Posted on: 07/30/2018 | by: cthuntsville

July 30, 2018 A massive malvertising campaign has been exposed today in a report published by cybersecurity firm Check Point. Researchers believe the operators of this malvertising campaign have cozied up to an ad network and ad resellers in order to make sure their hijacked traffic reaches preferred bad actors, who then redirect victims to […]

Continue Reading

The U.S. Is The Most At Risk Nation For Cyber Attacks

Posted on: 06/26/2018 | by: cthuntsville

Being “#1” isn’t always a good thing.  Rapid7 has just published their third annual “National Exposure Index,” and unfortunately, the United States has the dubious honor of being the nation most at risk for a cyber attack on its core services.  The group’s methodology for ranking national exposure comes down to tracking the number of […]

Continue Reading

How to Keep Your Google Account Secure

Posted on: 06/18/2018 | by: cthuntsville

Nowadays, data breaches are a regular occurrence, affecting businesses and individuals across the world. Once your private data is in the hands of a hacker, your life and career can be turned upside down in a matter of minutes. The problem is, most people don’t realize the importance of securing their online data, and this […]

Continue Reading

5 VoIP Trends That Are Pushing Enterprise Boundaries

Posted on: 06/18/2018 | by: cthuntsville

The importance of VoIP in an enterprise is undeniable as more and more companies are now embracing the technology to empower many aspects of their operations. Although the technology has been around for a while, the concerns revolving around the reliability of application and the internet itself has kept the industry restricted to more trusted […]

Continue Reading

Vega Stealer Malware Goes After Your Saved Credentials

Posted on: 05/30/2018 | by: cthuntsville

There’s a new security threat to be worried about, and security professionals are warning that it could be very bad indeed. The new malware is known as the “Vega Stealer,” and is currently being used in a relatively simplistic phishing campaign designed to harvest financial data that has been saved in both Google Chrome and […]

Continue Reading

Your Kids’ Personal Info May Have Been Compromised

Posted on: 05/27/2018 | by: cthuntsville

An identity threat company called 4iQ has recently published a report called “Identities in the Wild: The Tsunami of Breached Identities Continues.” Unfortunately, the information in the report contains all bad news. Some of the details are simply confirmations of things we already knew, and some are shocking statistics that will leave you feeling dismayed. […]

Continue Reading

Viruses? Spyware? PC is old?

Posted on: 05/25/2018 | by: cthuntsville

We can make your PC run FASTER than it ever has! Computer Troubleshooters Fresh Start

Continue Reading

All Twitter Passwords Exposed, Change Your Password Now

Posted on: 05/18/2018 | by: cthuntsville

Twitter shot itself in the foot recently but is working hard to get out in front of the problem. According to a recent blog post, the company experienced an issue with its hashing routine – a process which masks user passwords, making them virtually impossible to crack. Because of the issue, user passwords were stored […]

Continue Reading

Newsletter Sign-Up

  • Get our exclusive offers, tips and news delivered right to your inbox

  • This field is for validation purposes and should be left unchanged.