IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
September 15th, 2018 | Jay Ferron
In the last few years the price of 3D printers fit for home use has fallen substantially. They have become cheap enough for people without advanced technical skills, especially security skills to venture into this market area. By default, most of the current 3D printers require being tethered to a PC full time via USB to configure and run print jobs. - read more
 
Blog Entry
September 15th, 2018 | Jay Ferron
Announcing PowerShell Core 6.1 - read more
 
Blog Entry
August 6th, 2018 | Jay Ferron
The Spectre attack has been an unexpected danger to our security since January of this year. It’s an attack on most modern processors that use speculative execution to leak sensitive information to a potential attacker. - read more
 
Blog Entry
August 6th, 2018 | Jay Ferron
Researchers at Cisco Talos recently spent some time probing the Samsung SmartThings Hub, a device designed to be the center of your smart home. They discovered a number of vulnerabilities that allow remote information leakage up to arbitrary remote code execution. The device is designed to communicate with a range of devices over Ethernet, Z-Wave, Bluetooth, and Zigbee. - read more
 
Blog Entry
July 31st, 2018 | Jay Ferron
BOISE, Idaho (AP) — Idaho prison officials say 364 inmates exploited vulnerable software in the JPay tablets they use for email, music and games to collectively transfer nearly a quarter million dollars into their own accounts. - read more
 
Blog Entry
July 25th, 2018 | Jay Ferron
No More Ransomware Web Site https://www.nomoreransom.org/en/index.htmlis a site you should save in your favorite. - read more
 
Blog Entry
July 24th, 2018 | Jay Ferron
The Apache Software Foundation has released security updates to address vulnerabilities in Apache Tomcat versions 9.0.0.M9 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. A remote attacker could exploit one of these vulnerabilities to obtain sensitive information. - read more
 
Blog Entry
July 24th, 2018 | Jay Ferron
  Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange. Overview Bluetooth firmware or operating system software drivers may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device. - read more
 
Blog Entry
July 14th, 2018 | Jay Ferron
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Here a new one that has started to circulate.__________________________________________ - read more
 

Pages

Subscribe to My Information Resource