How to tighten up Android security

Posted on Wednesday May 09, 2018  |  safe browsing, remote wipe, multi factor authentication, mobile device, lock screen, find my device, app permissions, android

Critical Android security issues have become somewhat of the norm in recent months. Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they're having more success than ever before. But there are some things you can do to tighten up your Android security, and most of the features you need are already built in!

 

How to get virtualization working

Posted on Tuesday May 08, 2018  |  virtualization, oracle virtualbox, microsoft windows, intel, hyper v, dell vmware, bios, amd

Virtualization is available in every modern computer. It allows you to create additional virtual environments that run on your actual hardware. Sometimes, though, it won't work right and results in errors. Here are steps to get it working properly.

 

How HIPAA Impacts Social Media Usage

Posted on Monday May 07, 2018  |  social media, privacy, medical, hipaa, healthcare, facebook, compliance

Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization.

 

Eight New Meltdown-Like Flaws Found

Posted on Sunday May 06, 2018

An anonymous reader quotes Reuters: Researchers have found eight new flaws in computer central processing units that resemble the Meltdown and Spectre bugs revealed in January, a German computing magazine reported on Thursday. The magazine, called c't, said it was aware of Intel Corp's plans to patch the flaws, adding that some chips designed by ARM Holdings, a unit of Japan's Softbank, might be affected, while work was continuing to establish whether Advanced Micro Devices chips were vulnerable... The magazine said Google Project Zero, one of the original collective that exposed Meltdown and Spectre in January, had found one of the flaws and that a 90-day embargo on going public with its findings would end on May 7... "Considering what we have seen with Meltdown and Spectre, we should expect a long and painful cycle of updates, possibly even performance or stability issues," said Yuriy Bulygin, chief executive officer of hardware security firm Eclypsium and a former Intel security researcher. "Hopefully, Meltdown and Spectre led to improvements to the complicated process of patching hardware." Neowin now reports that Intel "is expected to release microcode updates in two waves; one in May, and the other in August."

 

Microsoft's 'Meltdown' Patch For Windows 10 Contains a Fatal Flaw

Posted on Saturday May 05, 2018

An anonymous reader quotes BleepingComputer: Microsoft's patches for the Meltdown vulnerability have had a fatal flaw all these past months, according to Alex Ionescu, a security researcher with cyber-security firm Crowdstrike. Only patches for Windows 10 versions were affected, the researcher wrote today in a tweet. Microsoft quietly fixed the issue on Windows 10 Redstone 4 (v1803), also known as the April 2018 Update, released on Monday. "Welp, it turns out the Meltdown patches for Windows 10 had a fatal flaw: calling NtCallEnclave returned back to user space with the full kernel page table directory, completely undermining the mitigation," Ionescu wrote. Ionescu pointed out that older versions of Windows 10 are still running with outdated and bypass-able Meltdown patches. Wednesday Microsoft issued a security update, but it wasn't to backport the "fixed" Meltdown patches for older Windows 10 versions. Instead, the emergency update fixed a vulnerability in the Windows Host Compute Service Shim (hcsshim) library (CVE-2018-8115) that allows an attacker to remotely execute code on vulnerable systems.

 

Preventing theft of service in VoIP

Posted on Friday May 04, 2018  |  voip, spammers, spam over internet telephony, pc, internet based, identity theft, fraud

VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, and if you want to learn how to do it, read on.

 

Page:   1...192193194195196197198199200...314

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016