IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
November 15th, 2019 | Jay Ferron
   The out of band management system bundled on almost all Intel processors has become a hot target for attackers in recent years. This is because it runs alongside the main processor and has virtually unrestricted access to all the hardware in the machine. As long as the machine has power the management engine is sitting there silently waiting for commands from a system administrator with access to it. - read more
 
Blog Entry
November 15th, 2019 | Jay Ferron
    Researchers at Bitdefender have found a vulnerability in Amazon’s Ring Video Doorbell which allows an attacker with proximity to the device to intercept the Wi-Fi credentials of the network it operates on, which could lead to further attacks to devices on the network. The Ring Doorbell is an IoT device that allows a person to remotely view and communicate to people on their property. - read more
 
Blog Entry
November 13th, 2019 | Jay Ferron
    Amazon Alexa and Google Home are listening. It’s likely you are aware of the security and privacy concerns as well as their mitigations. It’s the price we pay for the technology we want. Unfortunately, there is another attack vector recently exposed by researchers at Germany's Security Research Labs (SRL). The most interesting part of this research is that it is an absolute “confirmed proofof-concept”. - read more
 
Blog Entry
November 13th, 2019 | Jay Ferron
    Multinational software company Adobe has suffered a data leak that exposed the account information of an estimated 7.5 million customers, according to security researcher Bob Diachenko. Those affected were subscribers to Adobe’s Creative Cloud service which provides users with access to its line of software applications which includes Photoshop, Illustrator, and After Effects, among others. - read more
 
Article
November 11th, 2019 | James E. Gaskin
AMD still lags way behind Intel in market share, but products based on its Ryzen platform are helping the chip maker chip away at that gap. - read more
 
Blog Entry
November 1st, 2019 | Jay Ferron
    Security, for many, seems hard to do right.   I know that we all think about firewalls, patch management, antivirus and physical security.   But I like to cover an area that does not get focused on by most companies.      - read more
 
Blog Entry
October 28th, 2019 | Jay Ferron
    Wandera’s threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions in order to fraudulently collect ad revenue. - read more
 
Blog Entry
October 28th, 2019 | Jay Ferron
    Smartphones have become the icon of our modern technological society. They are so prevalent that app development has grown exponentially in recent years in the struggle to become the next Facebook or Pinterest. The phrase “There’s an app for that” truly describes the breadth of apps available. - read more
 
Blog Entry
October 22nd, 2019 | Jay Ferron
NIST   National Vulnerability Database  - CVE-2019-17666 Detail                         Current Description - read more
 
Blog Entry
October 21st, 2019 | Jay Ferron
   The vast majority of websites these days have Hypertext Transfer Protocol Secure (HTTPS) enabled, adding a layer of security that protects our communications against eavesdropping and tampering. It is encrypted using Transport Layer Security (TLS), the current standard for secure web communication. Like all protocols, it is not immune to attack. - read more
 

Pages

Subscribe to Technology