IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
June 12th, 2019 | Jay Ferron
    Phishing attacks are perhaps the most common method attackers use to gain access to a target network. It is so common that many companies employ outside companies to generate test phishing campaigns in order to train employees on what to look out for. - read more
 
Blog Entry
June 12th, 2019 | Jay Ferron
    Over the years, app security has improved enough that developers must request permissions to areas of your smartphone that their applications need to access. Now we have some control over which apps have access to things such as your camera or extended storage. But did you know that there are still parts of your phone that require no permissions whatsoever? - read more
 
Blog Entry
June 6th, 2019 | Jay Ferron
Download the content from the Microsoft Security Compliance Toolkit(click Download and select Windows 10 Version 1903 and Windows Server Version 1903 Security Baseline - read more
 
Blog Entry
May 31st, 2019 | Jay Ferron
    Docker is a well known application that uses operating-system-level virtualization to develop and deliver software in packages called containers. Senior software engineer Aleksa Sarai discovered a flaw that affects all versions of Docker, that could allow an attacker to gain read and write access to any file on the host system. - read more
 
Blog Entry
May 30th, 2019 | Jay Ferron
    The end of last month at Black Hat Asia 2019, Mark Ermolov and Maxim Goryachy from Positive Technologies gave a presentation titled “Intel VISA: Through the Rabbit Hole”. Slashdot characterized the presentation as researchers had discovered and abused new and undocumented features in intel chipsets. - read more
 
Blog Entry
May 30th, 2019 | Jay Ferron
    Researchers at Blackberry’s Cylance Labs have discovered novel techniques utilizing steganography, the practice of concealing a file, message, image, or video within another file, message, image, or video, to load malware payloads onto victims’ machines.  - read more
 
Blog Entry
May 25th, 2019 | Jay Ferron
Microsoft has always focused on building the tools and platforms that IT needs to be successful. In this era of digital disruption, we are working to deliver a modern workplace experience that is loved by users and trusted by IT. This focus is at the heart of how we build Windows 10—bringing you the latest advances in security, IT tools, and productivity, anchored in intelligence powered by the cloud.  - read more
 
Blog Entry
May 14th, 2019 | Jay Ferron
Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user intera - read more
 

Pages

Subscribe to Technology