PDC Technologies
  • Home
  • Managed Cloud
    • PDC Private Cloud
    • Public Cloud
    • Microsoft 365
    • Managed Virtual Desktop (VDI) Solutions
    • Backup & Disaster Recovery
    • Infrastructure as a Service
    • Web Hosting & Management
  • Managed Security
    • Cyber Security
      • Antivirus
      • DNS Protection
      • Email Threat Protection
      • Endpoint Detection & Response
      • Multi-Factor Authentication
      • Virtual Private Network (VPN)
    • Facility Security
      • Access Control
      • Video Surveillance
  • Managed IT
    • All-Inclusive Managed IT Services
    • Co-Managed IT Solutions
  • Managed AI
    • AI Security & Compliance
    • AI Risk Management
    • Custom AI Integrations
    • Training & Enablement
  • Cyber News
  • Contact
PDC Technologies
  • Home
  • Managed Cloud
    • PDC Private Cloud
    • Public Cloud
    • Microsoft 365
    • Managed Virtual Desktop (VDI) Solutions
    • Backup & Disaster Recovery
    • Infrastructure as a Service
    • Web Hosting & Management
  • Managed Security
    • Cyber Security
      • Antivirus
      • DNS Protection
      • Email Threat Protection
      • Endpoint Detection & Response
      • Multi-Factor Authentication
      • Virtual Private Network (VPN)
    • Facility Security
      • Access Control
      • Video Surveillance
  • Managed IT
    • All-Inclusive Managed IT Services
    • Co-Managed IT Solutions
  • Managed AI
    • AI Security & Compliance
    • AI Risk Management
    • Custom AI Integrations
    • Training & Enablement
  • Cyber News
  • Contact
PDC Technologies

Our Gallery

Contact Info

  • 411 University St, Seattle, USA
  • theratio_interior@mail.com
  • +1 800 456 789 123
Twitter Facebook-f Linkedin-in Instagram

Category: blog

blog
April 7, 20200 Comments

Critical Flaw in Adobe’s Creative Cloud Desktop Application Fixed

Adobe recently released an out-of-bound security update for a flaw in the Windows version of its Creative Cloud Desktop Application. The flaw was caused by a time-of-check to time-of-use (TOCTOU) race condition, a condition that occurs when two or more system operations attempt to make changes to a shared data. When the race condition is […]

READ MORE
blog
April 7, 20200 Comments

A Lack of Data Backup & Disaster Recovery Solutions for SMBs

According to a study Infrascale conducted in March of this year, about 21% of small to medium scale businesses lack data backup or disaster recovery solutions. The study was conducted using over 500 C-level executives, with CEOs consisting of 87% of the participant group. The remainder of the group were CTOs and CIOs. 58% of […]

READ MORE
blog
March 31, 20200 Comments

Ransomware as a Service: Attackers are Publishing Data of Companies Not Paying Ransom

Ransomware attacks are popular for how they operate: they steal data, encrypt them and offer them back to their victims at a price – ransom. The response of victims depends on the value they place on the data, and most times, every single piece of data is valuable. Successful attacks are popular for raking in […]

READ MORE
blog
March 31, 20200 Comments

A Mirai-Like IoT BotNet Project by Russian Intelligence

A hacking group (Digital Revolution) recently released documents of an alleged project by Russian intelligence to build an IoT botnet that functions like Mirai Botnet. The project, aliased Fronton, is linked with the Federal Security Service (FSB). Digital Revolution claims that the documents, created between 2017 and 2018 were retrieved from 0Day in 2019. 0Day […]

READ MORE
blog
March 31, 20200 Comments

2 Ways That Cybercriminals Are Exploiting COVID-19 For Malicious Schemes

The lockdown of countries as a result of the COVID-19 pandemic has forced billions of people to stay at home. Employees have been forced to work remotely, schools are on lockdown and social activities are on hold, except social media and the internet. As we know, a time like this presents opportunities for cybercriminals and […]

READ MORE
blog
March 31, 20200 Comments

Data Leaks From Sodinokibi Ransomware Now Selling On Hacker Forums

The past year has seen changes in the way that malware threat actors extort money from their victims. In 2019, the operators of Maze Ransomware started publishing files of their victims on hack forums if they refused to pay the stipulated ransom. And since then, there has been an increasing adoption of this model by […]

READ MORE
blog
March 27, 20200 Comments

FBI Cautions The Population About COVID-19 Scammers

As seen in every major pandemic, epidemic or any other global difficulty that humanity has experienced, other than panicking, some people take this time as a prime period to scam others. The pandemic of COVID-19 (Coronavirus) is no exception. Scammers of all kinds are using this pandemic to steal, hurt and otherwise inconvenience other individuals […]

READ MORE
blog
March 27, 20200 Comments

COVID-19 Threat Increases As Organizations Rally For System Safety

As with every world crisis, COVID-19 (Coronavirus) has also created an opportunity for malicious parties to take advantage of this vulnerable time and to exploit the vulnerabilities of others. It is no secret that the cyberattacks, scams, and frauds are increasing to a level that is quite drastic. A level that is portraying a risk […]

READ MORE
blog
March 27, 20200 Comments

Israeli Shield App Protects You From COVID-19

People all around the world are worried about Coronavirus, especially due to the way it spreads. It is almost impossible to tell whether a person is a carrier of the virus. We could be standing next to a carrier and we would not know that we are being infected. For this exact reason, the Israeli […]

READ MORE
blog
March 25, 20200 Comments

As the Pandemic Continues, Taking Precautionary Measures to Stop The Spread

In a report released by the officials of Pennsylvania Department of Banking and Securities, the tactics employed by these scammers include the creation of an atmosphere of urgency and limited time offers, secrecy and the prompt not to tell anyone, low or minimal risks with guaranteed high returns, and unsolicited offers in terms of calls, […]

READ MORE
  • 1
  • 2
  • 3
  • …
  • 24
  • 25
  • 26
  • 27
  • 28