Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

0 Comments
Continue reading

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

0 Comments
Continue reading

You Won’t Believe the Most Evil Domains on the Internet

b2ap3_thumbnail_some_domains_are_associated_with_malware_400.jpgHave you ever wondered which websites on the Internet are the most dangerous? Recently it’s been discovered that the majority of threatening websites on the Internet fall into some very easy-to-identify categories; or, more specifically, about 95 percent of all dangerous websites are found on ten top-level domains.

0 Comments
Continue reading

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

0 Comments
Continue reading

The Best Way to Prevent Hackers from Finding Holes in Your Security

b2ap3_thumbnail_security_assessment_400.jpgYour organization is constantly at risk of being attacked by malicious entities. This is a fact that modern businesses have to live with. If this is the first time you’re seriously contemplating cyber security, you need to take all potential options into account; including the worst-case scenario, and how you would combat it.

0 Comments
Continue reading

Alert: Email Appearing to Be From Microsoft about Windows 10 Upgrade is Really Ransomware

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor many Windows users, the fact that Microsoft is issuing Windows 10 incrementally came as a shock for those who patiently waited for its release date. While users wait, however, hackers are taking advantage of those who are less patient by creating a ransomware that disguises itself as a launcher for a Windows 10 download. So, while you sit and wait for your version of the latest OS, don’t fall prey to deals that seem too good to be true.

0 Comments
Continue reading

Stop Blaming Technology for the Attacks Caused By People

b2ap3_thumbnail_protect_your_business_400.jpgIt might seem like the obvious reason for hacks and data loss is due to technology being unpredictable, but in all reality, it’s important to remember that some of the problems we experience with technology come from the people operating it. To this end, it’s important to realize that the people operating technology can also protect themselves from hackers.

0 Comments
Continue reading

Hackers Shop for Vulnerabilities at Online Black Markets

b2ap3_thumbnail_black_market_peddler_400.jpgJust like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, there’s a new marketplace where hackers can get their hands on these vulnerabilities, and it’s all thanks to the anonymity of the Darknet.

0 Comments
Continue reading

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.