IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
July 24th, 2018 | Jay Ferron | My information Resource
The Apache Software Foundation has released security updates to address vulnerabilities in Apache Tomcat versions 9.0.0.M9 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. A remote attacker could exploit one of these vulnerabilities to obtain sensitive information.NCCIC - Read More
 
July 24th, 2018 | Jay Ferron | My information Resource
  Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange.OverviewBluetooth firmware or operating system software drivers may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Here a new one that has started to circulate. - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
1. EXECUTIVE SUMMARYCVSS v3 6.4Vendor: Medtronic Equipment: MyCareLink Patient MonitorVulnerabilities: Use of Hard-coded Password, Exposed Dangerous Method or Function2. RISK EVALUATIONIf exploited, these vulnerabilities may allow privileged access to the monitor’s operating system - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
1. EXECUTIVE SUMMARYCVSS v3 7.5ATTENTION: Exploitable remotelyVendor: Abbott LaboratoriesEquipment: Implantable Cardioverter Defibrillator and Cardiac Synchronization Therapy DefibrillatorVulnerabilities: Improper Authentication and Improper Restriction of Power ConsumptionMedSec Holdings Ltd., - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
The Chinese cybersecurity research team known as Keen Security Lab has disclosed 14 security vulnerabilities affecting a range of BMW vehicles. Eight of the flaws affect the infotainment system, four affect the Telematics Control Unit (TCU), and two affect the Central Gateway Module (CGM). The TCU - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
MuddyWater malware is believed to be once again targeting organizations across the world.  This malware was first reported when it targeted the Saudi government back in 2017 andwas reported to have also targeted other organizations in the US, Turkey, and other Middle Eastern countries.Although - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
It was announced that European researchers discovered that the popular PGP and S/MIME email encryption standards are vulnerable to being hacked. Dubbed EFAIL, it is described as vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME. From the website, EFAIL abuses active - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
It was a busy end of May for cybersecurity in our nation’s capital. The White House Office of Management and Budget issued a report saying that most federal agencies are not prepared for cyberattacks, while noting that almost three quarters of the agencies assessed have programs that are at - Read More
 
July 14th, 2018 | Jay Ferron | My information Resource
Red Hat Enterprise Linux (RHEL) is a popular distribution used by many organizations for servers and other network endpoints. Two free versions of the operating system have also branched out of RHEL, Fedora and CentOS. US-CERT issued an alert Wednesday that a critical vulnerability had been - Read More
 

Pages