IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
October 21st, 2019 | Jay Ferron
    Researchers at Palo Alto's Unit 42 have discovered a worm that mines Monero, a privacy focused cryptocurrency, and spreads itself via infected Docker Daemons in the Docker Engine. Shodan scans of Docker engines show over 2000 unsecured Docker hosts. The researchers have named the cyptojacking malware Graboid.  - read more
 
Blog Entry
October 21st, 2019 | Jay Ferron
National Cyber Awareness System:   NSA and NCSC Release Joint Advisory on Turla Group Activity - read more
 
Blog Entry
October 16th, 2019 | Jay Ferron
    A commonly used method to secure network resources is a Virtual Private Network (VPN). They allow remote network devices to securely communicate with local resources as if they were physically plugged into the same network segment. You may even use one when working remotely to help keep your network traffic secure. - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
The Cybersecurity and Infrastructure Security Agency (CISA) has observed an increase in ransomware attacks across the world: See CISA's - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
Original release date: October 4, 2019 - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
Original release date: October 4, 2019 - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
    The Portable Document Format (PDF) standard has been able to provide many benefits that unify communications across many different software and hardware platforms. One of those elements is the encryption schemes that allow users to password protect their documents from view, edit, or saving permissions without the required password. - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
    Remote malware has been around for almost the entire history of computers. Attackers are always looking for ways to exfiltrate data from systems and be able to control their malware from a remote location. - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
    Baseband Management Controllers (BMC) are a popular feature found on most motherboards targeting the server market. They provide a number of convenience functions for remote management which is great for machines typically located in a cold noisy room. Some of the functions they provide include remote power cycling, keyboard video mouse (KVM), and virtual media emulation. - read more
 
Blog Entry
October 5th, 2019 | Jay Ferron
    Researchers at Cisco Talos have discovered a fake veteran hiring website, hosted by an Iranian hacking group, luring users into downloading malware by spoofing a legitimate veteran job search site. - read more
 

Pages

Subscribe to My Information Resource