IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
October 20th, 2018 | Jay Ferron
For the past four years, thousands of servers may have been subject to an  extremely simple authentication bypass vulnerability. CVE-2018-10933 affects libssh versions since 0.6.0, an implementation library for Secure Shell (SSH) that was released in 2014. It is limited only to certain implementations of SSH and does not affect the widely-used OpenSSH.  - read more
 
Blog Entry
October 20th, 2018 | Jay Ferron
Advanced Persistent Threats (APT) are being recognized as one of the biggest cyber threats in the industry today. There are many groups globally behind the numerous attacks of this type in recent history. Three major cyber incidents that garnered global attention were the BlackEnergy power grid attack, the Industroyer power grid attack, and the NotPetya malware outbreak. - read more
 
Blog Entry
October 18th, 2018 | Jay Ferron
The 10C update for Windows Server 2016 has just been published, it includes critical updates for Storage Spaces Direct deployments and we recommend all customers aggressively adopt.  This update addresses all top known supportability issues.   - read more
 
Blog Entry
October 18th, 2018 | Jay Ferron
The 2018 NY Metro Joint Cyber Security WEBINAR will take place on Thursday October 18th. NYMJCSC is now in its fifth year; featuring keynotes, panels and sessions aimed at various aspects of information security and technology. This year will feature a webinar format allowing NYMJCSC to reach and educate a broader audience. - read more
 
Blog Entry
October 18th, 2018 | Jay Ferron
This new app from NYC - read more
 
Blog Entry
October 18th, 2018 | Jay Ferron
 
Blog Entry
October 18th, 2018 | Jay Ferron
As a public Service announcement I am copy and posting this on my blog. The original content comes form CENTER FOR CYBER SAFETY AND EDUCATION, - read more
 
Article
October 6th, 2018 | James E. Gaskin
The Internet of Things allow you to engage shoppers at the right place and right time with the right message. - read more
 
Blog Entry
October 5th, 2018 | Jay Ferron
Several research labs have been releasing their finding on a new take of DNSChanger.  A new router-based exploit known as GhostDNS seems to be made up of three variations of DNSChanger.  By using Shell DNSChanger, Js DNSChanger, and PyPhp DNSChanger, GhostDNS can infect over 70 different router models. However, GhostDNS is more than the sum of its DNSChanger components. - read more
 

Pages

Subscribe to Technology