IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
July 14th, 2018 | Jay Ferron | My information Resource
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Here a new one that has started to circulate. - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
1. EXECUTIVE SUMMARYCVSS v3 6.4Vendor: Medtronic Equipment: MyCareLink Patient MonitorVulnerabilities: Use of Hard-coded Password, Exposed Dangerous Method or Function2. RISK EVALUATIONIf exploited, these vulnerabilities may allow privileged access to the monitor’s operating system - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
1. EXECUTIVE SUMMARYCVSS v3 7.5ATTENTION: Exploitable remotelyVendor: Abbott LaboratoriesEquipment: Implantable Cardioverter Defibrillator and Cardiac Synchronization Therapy DefibrillatorVulnerabilities: Improper Authentication and Improper Restriction of Power ConsumptionMedSec Holdings Ltd., - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
The Chinese cybersecurity research team known as Keen Security Lab has disclosed 14 security vulnerabilities affecting a range of BMW vehicles. Eight of the flaws affect the infotainment system, four affect the Telematics Control Unit (TCU), and two affect the Central Gateway Module (CGM). The TCU - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
MuddyWater malware is believed to be once again targeting organizations across the world.  This malware was first reported when it targeted the Saudi government back in 2017 andwas reported to have also targeted other organizations in the US, Turkey, and other Middle Eastern countries.Although - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
It was announced that European researchers discovered that the popular PGP and S/MIME email encryption standards are vulnerable to being hacked. Dubbed EFAIL, it is described as vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME. From the website, EFAIL abuses active - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
Red Hat Enterprise Linux (RHEL) is a popular distribution used by many organizations for servers and other network endpoints. Two free versions of the operating system have also branched out of RHEL, Fedora and CentOS. US-CERT issued an alert Wednesday that a critical vulnerability had been - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
It was a busy end of May for cybersecurity in our nation’s capital. The White House Office of Management and Budget issued a report saying that most federal agencies are not prepared for cyberattacks, while noting that almost three quarters of the agencies assessed have programs that are at - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
Since 2012, the Necurs botnet has been an evolving work horse of a botnet, backing up the Jaff ransomware, Dridex banking Trojan, and Locky ransomware campaigns. Most recently it has been found pushing URL files with misleading icons to trick victims into exposing themselves to the malware of the - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
The personal data of 21 million Timehop customers has been compromised as hackers were able to breach their backend server environment. Timehop functions by connecting to social media platforms to show users’ past memories. The breach was disclosed on Sunday, July 8th, stating that the breach - Read More
 

Pages