top of page
3N1 IT Consultants Security News
Search


How Well Do You Know Your Incident Response Plan?
Introduction The faster you can identify suspicious activity on your network, the faster you can respond to the threat actor. But...
3N1 IT Consultants
Jun 16, 20233 min read


Beginning of the End? Behind the Latest Breach on ChatGPT
Introduction Since bursting onto the scene in November 2022, ChatGPT has changed the game for artificial intelligence bots. Gone are the...
3N1 IT Consultants
Jun 9, 20233 min read


Most Common Brand Faked By Phishers So Far This Year
Introduction Cyber-thieves love to use the names of big corporations in their phishing campaigns. If they’re spamming large swaths of...
3N1 IT Consultants
Jun 6, 20233 min read


Congress Exposed in PHI-Related Data Breach
Introduction How far can cybercriminals go? Can they breach your home network? Could they get through your work computers? What about...
3N1 IT Consultants
May 26, 20233 min read


Beware This New-and-Improved Banking Trojan
There’s a whole new type of malware that has been making the rounds as of late. Whether you’re running the latest version of Windows or...
3N1 IT Consultants
May 16, 20232 min read


Have You Heard of the Near-Ultrasound Inaudible Trojan?
Introduction Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or...
3N1 IT Consultants
May 9, 20232 min read


A Dark Power is Rising: Behind the Emerging Ransomware Threat
Introduction A new, sinister ransomware is sweeping the web. Dark Power, the nascent evil of worldwide ransomware threat group, has...
3N1 IT Consultants
Apr 18, 20232 min read


Is Your Face ID Being Held Without Your Consent…or Your Knowledge?
Introduction Face ID is just one form of biometric identification that is used in a variety of ways. Sometimes it’s for convenience and...
3N1 IT Consultants
Apr 11, 20233 min read


Cyber-Criminals Are Going After Crypto ATMs
Introduction Do you use cryptocurrency? If you do, then how do you refill your wallet – have you ever visited a crypto ATM to purchase...
3N1 IT Consultants
Mar 31, 20233 min read


How Secure is Your Favorite Social Media App?
Introduction We all use social media. The platform we prefer might differ, but 59% of the people around the globe have some form of it....
3N1 IT Consultants
Mar 28, 20233 min read


Data Breach on AT&T Rattles Millions
Introduction Do you use AT&T as your primary telecom provider? Do you know someone who does? Then you need to know what’s just happened...
3N1 IT Consultants
Mar 17, 20233 min read


What’s Up With the Phone Theft Epidemic?
Introduction Has there been a crazy rise in stolen phones in your area the past couple of years? It’s not just in your head. Phone theft...
3N1 IT Consultants
Mar 14, 20232 min read


Gamer or Gambler? Watch Out for this New Social Engineering Threat
Introduction Ice Breaker . No, not the kind that you play during team building exercises. This is the name of a recent social...
3N1 IT Consultants
Mar 7, 20233 min read


What to Do with Default Apps
Introduction If you downloaded iTunes anytime in the early 2000s, you might remember being confused when it came preloaded with the U2...
3N1 IT Consultants
Feb 28, 20232 min read


Breach on GoDaddy Goes Back “Multiple Years”
Introduction Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website...
3N1 IT Consultants
Feb 21, 20233 min read


Data Breach Exposes 1M CHS Patients’ PHI
Introduction Are you one of the people across America who rely on Community Health Systems? CHS is a leading operator of general acute...
3N1 IT Consultants
Feb 17, 20232 min read


Roaming Mantis: Real-Time Case Study in Compromised Public WiFi
Introduction The longer you go without being negatively impacted by a data breach, it’s natural to become more blasé with some of the...
3N1 IT Consultants
Feb 10, 20232 min read


Inside the Breach on T-Mobile
Introduction 37M T-Mobile customers learned that their personally identifiable information (PII) was exposed in a data breach on the...
3N1 IT Consultants
Feb 3, 20233 min read


How Encryption Really Works: A Beginner’s Guide
Introduction Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. Even those with a...
3N1 IT Consultants
Jan 31, 20233 min read


Is Malware About to Get 60x Faster?
Introduction Artificial intelligence has become incredibly powerful. We can create animated avatars of ourselves with just a facial...
3N1 IT Consultants
Jan 13, 20232 min read

00:59

00:57

00:50

00:55

00:58

00:56
bottom of page