IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
August 26th, 2019 | Jay Ferron
The Internal Revenue Service (IRS) has issued a warning about a new email scam in which malicious cyber actors send unsolicited emails to taxpayers from fake (i.e., spoofed) IRS email addresses. The emails contain a link to a spoofed IRS.gov website that displays fake details about the targeted recipient’s tax refund, return, or account. - read more
 
Blog Entry
August 26th, 2019 | Jay Ferron
    The Ruby programming language is a high level general-purpose programming language that was developed to focus on being Object oriented when the options for it were few and the creator found them lacking. The language uses a package manager called RubyGems to have a standardized platform for managing programs and libraries.  - read more
 
Blog Entry
August 26th, 2019 | Jay Ferron
    Apple accidentally re-introduced a previously patched vulnerability from iOS 12.3 into iOS 12.4. This led to the release of a jailbreak for iOS 12.4 from Security Researcher Pwn20wnd called “unc0ver 3.5.0.” This is the first jailbreak to be released for up-to-date iPhones in years. - read more
 
Blog Entry
August 6th, 2019 | Jay Ferron
Knowbe4 is a great solution for companies to train user on Social Engineering issues.Here a great example of the content that they deliver to their base. - read more
 
Blog Entry
August 6th, 2019 | Jay Ferron
    New technology often saturates a market before fully ripening to prime usefulness. The race to be first to market is often seen in the idea of recognized household names like Alexa, Blackberry, or even the Oculus Rift. While they might not always be the best at what they do, the familiarity can smooth over many of the kinks in the products they produce. - read more
 
Blog Entry
 
Blog Entry
 
Blog Entry
August 2nd, 2019 | Jay Ferron
Original release date: August 2, 2019 The CERT Coordination Center (CERT/CC) has released information on a vulnerability affecting Cylance Antivirus products. A remote attacker could exploit this vulnerability to take control of an affected system. - read more
 
Blog Entry
July 30th, 2019 | Jay Ferron
Original release date: July 30, 2019 - read more
 
Blog Entry
July 19th, 2019 | Jay Ferron
    A team of cybersecurity researchers - Abhishek Anand, Chen Wang, JIan Liu, Nitesh Saxena, and Yingying Chen - have discovered and demonstrated a new side -channel attack that could potentially allow apps to listen in on the voice coming through an Android phone’s loudspeakers without requiring any device permissions. - read more
 

Pages

Subscribe to My Information Resource