IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
December 16th, 2020 | Jay Ferron
 If you trust Google, and trust Chrome, the Chrome web store is a trusted place to look for extensions. Some are extremely useful, some are capable of blocking-ads, some make the browser look like a game, and some have a little more than expected. Over 80 million Chrome users installed one of 295 Chrome extensions that hijack and insert ads in to Google and Bing search results. - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
Attacks on specific chips or chipsets usually have wide reaching implications. Devices tend to use off the shelf chips inside rather than develop their own for a number of reasons. For Android phones the most popular processor chip family is the Qualcomm Snapdragon family of system on a chip (SoC). The Snapdragon is used in phones made by Samsung, Google, LG, and Xiaomi, to name a few. - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
 Title: Cyberattacks targeting health care must stop - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of active exploitation of a vulnerability in SolarWinds Orion Platform software versions 2019.4 through 2020.2.1, which was released between March 2020 through June 2020. - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
 Defining IoT Cybersecurity Requirements: Draft Guidance for Federal Agencies and IoT Device Manufacturers (SP 800-213, NISTIRs 8259B/C/D) - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
Title: Microsoft Information Protection and Microsoft Azure Purview: Better Together - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
 Microsoft latest security blogs, including some with more information about recent attacks. - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
 Microsoft recently blogged about the - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
This week, the NSA released an announcement saying, “Russian state- sponsored malicious cyber actors are exploiting a vulnerability in VMware Access and VMware Identity Manager2 products, allowing the actors access to protected data and abusing federated authentication.” This vulnerability is tracked as CVE-2020-4006 (7.2 CVSS score) which was issued on 23 November 2020 but updated recently with VMWare’s patch - read more
 
Blog Entry
December 16th, 2020 | Jay Ferron
ESET researchers have recently released information on the discovery of a new backdoor dubbed Crutch that uses Dropbox to exfiltrate stolen files. Crutch has been seen as early as 2015 and is believed to be a second-stage backdoor that is deployed after a victim has already been compromised. - read more
 

Pages

Subscribe to Tips and Advice