IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
May 4th, 2019 | Jay Ferron
    The Dells SupportAssist software is currently associated with a vulnerability allowing Remote Code Execution (RCE) attacks. It comes pre-installed on virtually all new Dell devices running Windows®, the SupportAssist application "proactively checks the health of your system’s hardware and software. When an issue is detected, the necessary system state information is sent to Dell for troubleshooting to begin." - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
Wednesday, May 22, 2019 9:00 AM–11:00 AM Pacific Time - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
    Researchers have found a new version of the Hawkeye malware kit and have noticed that alongside technical advances, they’ve included some business improvements. - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
   Macro enabled Office documents are a useful tool for automating advanced calculations in document files but they have a long history of abuse as well. They are easy to spot as documents containing embedded Visual Basic for Applications (VBA) code have a ‘m’ at the end of the filename, e.g .xlsm or .docm. When opening these files Microsoft Office asks if you would like to enable the embedded macros, and for good reason. - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
     With today’s cyber-focused society, there are numerous security companies constantly on the lookout for new variants of malware and threats that haven’t been seen before. So when new malware is discovered that not only provides a wide array of capabilities but also remained under the radar for 5 years, it begs further investigation. Researchers at Kaspersky Lab recently uncovered such a malware, which they dubbed TajMahal. - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
  The Exodus spyware now also exists in the iOS ecosystem. The package can take and deliver audio recordings, pictures, contacts, and location data. The spyware researchers note that the iOS version of the spyware delivers itself via phishing sites that imitate mobile carriers from Italy and Turkmenistan. - read more
 
Article
April 11th, 2019 | Frank J. Ohlhorst
Will accelerating and securing IoT solutions be the long-awaited “killer app” for blockchain? - read more
 
Blog Entry
March 23rd, 2019 | Jay Ferron
   A bug was discovered this week in Google Photos, where all photos in a users Google Photo account could have their metadata easily read and collected. Bad actors would target a particular query, for example, a location, and then measure the time it takes for the website to respond. Even though the response might be an access denied, there is value in knowing it’s presence or not. - read more
 
Blog Entry
March 23rd, 2019 | Jay Ferron
Please share important information  this with those who you know. United States Attorney William P. Barr recently stated that crimes against the elderly target some of the most vulnerable people in our society. Because of their stage in life, they don't have the opportunity frequently to recover, and the losses are devastating to them. - read more
 

Pages

Subscribe to Technology