Contronex | Security Solutions Distributor for Managed Solutions Partners
  • Home
  • Products
    • Bitdefender
    • IBM MaaS360
    • usecure
    • AppMoat by Seventh Knight
    • HornetSecurity
    • TechSafe
    • G DATA
    • Secure Disk for Bitlocker
    • SecureSafe
    • FileCap
    • Blue Shield
  • Support
    • Product Support
    • Downloads
    • Frequently Asked Questions
  • Contact Us
    • Request A Quote
    • Contact Information
  • Blog
  • Partners
Select Page

Threat Actors Target Ledger Data Breach Victims in New Extortion Campaign

Blackmailers are having a field day capitalizing on victims of the Ledger data leak from July 2020. Nearly a year after cybercriminals gained access to the e-commerce database of the France-based crypto wallet company, a new extortion campaign threatens users’...

Facebook Won’t Delete WhatsApp Accounts if You Don’t Agree to New Terms of Service

Facebook announced a few months ago that the upcoming policy changes would require non-European users to accept new terms and conditions or be forced to stop using the service. From the looks of it, Facebook won’t require it from the start, but aims to make the user...

German Privacy Watchdog Prohibits Facebook from Processing WhatsApp User Data

The Hamburg Commissioner for Data Protection and Freedom of Information (HmbBfDI) has imposed a three-month ban prohibiting Facebook from gathering and processing German WhatsApp users’data. On Tuesday, the top German privacy watchdog told Facebook officials to...

Fraudsters Use Bogus Pfizer Covid-19 Vaccine Surveys to Steal Personal Info and Money in Ongoing Scam Campaign

Scammers continue to piggyback on the pandemic and vaccination campaigns in a new giveaway vaccine survey scam purportedly from pharmaceutical giant Pfizer. According to Bitdefender Antispam Lab’s latest telemetry, the survey scam has reached over 200,000...

Threat Actor Compromised More than 25 Percent of Tor Network Relays, Research Shows

Unknown actors took control over a quarter of all Tor network relays to launch man-in-the-middle attacks, target bitcoin addresses and much more. Tor is a software that lets users obfuscate their network traffic by routing it automatically through numerous...
« Older Entries
Next Entries »

Recent Knowledge Base Articles

  • How to remove Add-On Modules from a company
  • How to Add/Remove Modules (Reconfiguring an Endpoint)
  • Phone no longer paired for 2FA
  • How to remove AD integration
  • Bitdefender install fails because of pre-existing endpoint solution
  • How to temporarily turn off on-access scanning
  • How to sync endpoints with Active Directory?
  • How to give a customer access to his GravityZone?
  • System requirements for modules
  • How to PERMANENTLY delete an endpoint?

Knowledge Base Categories

  • Bitdefender
  • G DATA
  • Facebook
  • X
  • Instagram
  • RSS

©2025 Contronex, Inc. | 108 10th Street North | Naples, Florida 34102 | 239-649-7836