- All Posts
- Banners
- Business
- BUSINESSES WE TAKE CARE OF IN BALTIMORE & WASHINGTON
- Case Studies
- Charles
- Clients
- Cyber Security
- Design
- Development
- Information Technology News & Information
- Reports
- Services
- Startup
- Tech Tips
- Technology
- Uncategorized
- Video Library
Microsoft Teams is known for being a reliable chatting software that many businesses use for communicating and sharing documents within your company. We utilize Teams every day at Hammett Technologies and could not be happier with its overall ease of use, innovation, and productivity. However, recently, security researchers have discovered…
A new malware strain has begun to attack IoT devices, wiping their firmware and rendering them useless. As of the writing of the article the malware has been live for a day and has already claimed a confirmed 2,000 victims in about 3 hours. Reports state that, Silex, the name…
Across the United States, hackers have been targeted cities through the use of ransomware. Ransomware is a malicious attack on a computer system which completely locks the user out of their computer until a “ransom” is paid (usually in bitcoins). For those who think paying the ransom will be the…
A new adware exploit has been discovered recently. Named “Cavallarin” after its founder, the exploit allows for the unwarranted download of various ads onto the users Mac device, all while being trusted by Apple’s macOS Gatekeeper. How the Cavallarin Exploit Works The exploit takes advantage of Mac’s Gatekeeper protection service,…
Clearing your cache and history on your favorite browser can greatly improve performance while you browse the web! However, many popular browsers hide the function within the settings, making it sometimes difficult to find. Don’t panic, I am here to help! Below you will find in-depth individual guides on clearing…
If you use Mozilla Firefox it is imperative that you make sure your browser is on version 67.0.3 or ESR 60.7.1! The vulnerability was found by Google’s Project Zero security team, and they describe the vulnerability as: “A type confusion vulnerability [that] can occur when manipulating JavaScript objects due to…
As technology continues to advance, so do those who aim to use it to exploit others. According to Accenture, when a business suffers a cybersecurity attack, an estimated $2.4 million is spent on recovery, and it takes an estimated 50 days to recover from the attack entirely. On a global…
If you have an Nvidia graphics card, it is within your best interest to make sure your drivers are up to date. On May 9, Nvidia released a statement stating that they have patched security holes within their display drivers that could have led to a denial of service attacks,…
Tax season is no doubt a happy time for many Americans. The extra boost in cash from paying taxes makes everyone’s wallet feel great! However, where there is money, there are unwelcome guests. While many are preparing their taxes and W-2 forms, hackers are busy developing malware to infect and…
At Hammett Technologies, we cannot stress enough how important it is that you have proper security in place to protect your company and personal information from potential attacks. Most malware today is designed to steal sensitive information from a victim’s computer, making healthcare providers high-priority targets. Cyber security expects in…