IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
 
Blog Entry
 
Blog Entry
June 13th, 2020 | Jay Ferron
   Researchers at Proofpoint have discovered a phishing campaign targeting companies within the United States’ utility sector. This campaign makes use of malicious documents to upload a remote access trojan (RAT) to the target’s system. - read more
 
Blog Entry
June 13th, 2020 | Jay Ferron
    The modern workplace involves a great amount of collaboration between team members and the generation of electronic documents for various purposes.  However, sharing these documents in a secure manner, especially with remote employees, has always been a troublesome issue. - read more
 
Blog Entry
June 13th, 2020 | Jay Ferron
    The dark web is not the only place to find dark things. As we've shown in the past, there are plenty of criminals operating on the clear web, often in places more open than you'd expect. This week,  researchers from threat intelligence firm KELA released a report on a marketplace called MagBo. - read more
 
Blog Entry
May 1st, 2020 | Jay Ferron
    Researchers at Cybereason, a cybersecurity firm based in Boston, MA, have exposed a novel banking trojan attacking Android mobile devices dubbed Eventbot. The Eventbot malware was developed with original code from the ground up and is significantly different from all previously known Android malware code. - read more
 
Blog Entry
April 30th, 2020 | Jay Ferron
Apple always took a firm stance on user security and reliability when it comes to their iPhone series. The iOS operating system is known as one of the most secure operating systems in the market. However, 2 major vulnerabilities have been recently discovered that have existed for years and are actively being exploited in the wild. - read more
 
Blog Entry
April 30th, 2020 | Jay Ferron
    The Domain Name System (DNS) is something most of us use every day, whether we think about it or not. It is hugely convenient for converting human readable addresses into the addresses that computers actually use to communicate with each other. - read more
 
Resource
April 20th, 2020 | Webroot
Over the last several years, the use of artificial intelligence (AI) and machine learning (ML) has maintained consistent growth among businesses. Despite the increase in adoption rates for these technologies, more than half of IT decision makers admitted they do not fully understand the benefits of these tools. - read more
 
Article
April 20th, 2020 | Samuel Greengard
Security is hard. Cloud security is even harder, but with the right strategy and methods it’s possible to design more secure systems. - read more
 

Pages

Subscribe to Technology