IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
May 1st, 2020 | Jay Ferron | My information Resource
    Researchers at Cybereason, a cybersecurity firm based in Boston, MA, have exposed a novel banking trojan attacking Android mobile devices dubbed Eventbot. The Eventbot malware was developed with original code from the ground up and is significantly different from all previously - Read More
 
April 30th, 2020 | Jay Ferron | My information Resource
Apple always took a firm stance on user security and reliability when it comes to their iPhone series. The iOS operating system is known as one of the most secure operating systems in the market. However, 2 major vulnerabilities have been recently discovered that have existed for years and are - Read More
 
April 30th, 2020 | Jay Ferron | My information Resource
    The Domain Name System (DNS) is something most of us use every day, whether we think about it or not. It is hugely convenient for converting human readable addresses into the addresses that computers actually use to communicate with each other. Sometimes this convenience can have - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
There is a security issues that most people do not know about .. That when you share a file in zoom  and other products, your computer can passes your NTLM security credentials, There is a GPO that should be set to only pass NTLM inside your domain (here the doc) https://docs.microsoft.com/ - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
March 9, 2020CMR 04-20Secret Service Issues COVID-19 (Coronavirus) Phishing Alert    WASHINGTON - Criminals are opportunists, and as seen in the past, any major news event can become an opportunity for groups or individuals with malicious intentions. The Coronavirus is no different. - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
    The FBI is warning of attacks from the FIN7 APT in which victims are sent USB drives via USPS and prompted to examine its contents. This attack is a variation of the “lost USB” or “BadUSB” tactic in which a malicious USB is dropped on site with the - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
    Speculative execution attacks seem to come out every month at this point. We’ve previously written about ones like Spectre and Meltdown, which allow an attacker to read portions of memory they should not have access to. A new speculative execution attack has recently been - Read More
 
March 21st, 2020 | Jay Ferron | My information Resource
    Cyber criminals are taking full advantage of the COVID-19 pandemic and increased communications surrounding it by installing spyware via apps to end-users’ mobile devices. The spyware being utilized is a commercial version called SpyMax, which can be acquired by anyone with - Read More
 
March 21st, 2020 | Jay Ferron | My information Resource
    Threat actors are currently spreading malicious Coronavirus themed health advisories via email which, when opened, deploy a Remote Administration Tool (RAT) onto the systems of targets. This phishing campaign has been traced back to APT36, a Pakistan-based group notable for - Read More
 
March 9th, 2020 | Jay Ferron | My information Resource
NIST requests your comments on Draft Special Publication (SP) 800-133 Revision 2, Recommendation for Cryptographic Key Generation, which discusses the generation of the keys to be managed and used by the approved cryptographic algorithms. This revision provides a method for - Read More
 

Pages