IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
July 14th, 2018 | Jay Ferron | My information Resource
Since 2012, the Necurs botnet has been an evolving work horse of a botnet, backing up the Jaff ransomware, Dridex banking Trojan, and Locky ransomware campaigns. Most recently it has been found pushing URL files with misleading icons to trick victims into exposing themselves to the malware of the - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
The personal data of 21 million Timehop customers has been compromised as hackers were able to breach their backend server environment. Timehop functions by connecting to social media platforms to show users’ past memories. The breach was disclosed on Sunday, July 8th, stating that the breach - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
The internet has become a staple of modern life. Having a website has become a necessity for most small businesses to connect with potential customers and provide information on the business and their offerings. However, one of the most common website development tools, WordPress, has a major - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
Rowhammer vulnerabilities are once again making mainstream news with the addition of CVE-2018-9942, dubbed RAMpage. This new variant of Rowhammer-based vulnerabilities allows attackers to compromise other applications and seize complete control over Android-based devices. What makes this - Read More
 
April 11th, 2018 | Jay Ferron | My information Resource
Domain Name Service (DNS) is an integral part of today’s public Internet infrastructure. The purpose of DNS is to resolve names to IP addresses and the technology itself was invented in 1983 when security was an afterthought. As a result, over the years many types of DNS attacks have been - Read More
 
March 29th, 2018 | Jay Ferron | My information Resource
National Cyber Awareness System:IC3 Issues Alert on Tech Support Fraud03/29/2018 01:00 PM EDT Original release date: March 29, 2018The Internet Crime Complaint Center (IC3) has released an alert on tech support fraud. Tech support fraud involves criminals claiming to provide technical - Read More
 
March 21st, 2018 | Jay Ferron | My information Resource
This blog post was authored by Erin Chapple, Director of Program Management, Windows Server.Today is a big day for Windows Server! On behalf of the entire Windows Server team, I am delighted to announce Windows Server 2019 will be generally available in the second half of calendar year 2018. - Read More
 
March 17th, 2018 | Jay Ferron | My information Resource
Microsoft has an event Webcast: Microsoft Security Intelligence Report Volume 23—Breaking Botnets and Wrestling RansomwareThe security threat landscape is constantly evolving, and Microsoft has spent over a decade tracking and analyzing software vulnerabilities, exploits, malware, - Read More
 
March 13th, 2018 | Jay Ferron | My information Resource
 Over the past few years, Fourth Generation Long Term Evolution or 4G LTE has become the standard for cellular communications. Security vulnerabilities affecting 4G LTE need to be taken seriously as any disruption to the network can have serious consequences to life in 2018 and beyond. - Read More
 
March 3rd, 2018 | Jay Ferron | My information Resource
Last month Adobe released a Flash security update to remediate the zero-day Remote Code Execution (RCE) CVE-2018-4878 vulnerability that was most visibly being utilized by the North Koreans to spy upon the south. The South Korean CERT team noted that the exploit was being actively used by the North - Read More
 

Pages