Tag Search: security

4 Common misconceptions about virtualization

Posted on Friday August 30, 2019  |  security, hardware, virtualization, it support, virtual servers, cost savings, software licensing

Small businesses can accomplish a lot by implementing virtualization in their office IT network. Unfortunately, many SMBs shy away from it because of various misconceptions. Here are four myths about virtualization you should stop believing.

 

Keeping Facebook and Twitter safe from hackers

Posted on Friday August 16, 2019  |  twitter, facebook, apps, security, android, ios, privacy, two factor authentication, settings, login

Keep your guard up! Pranksters, malicious attackers, and hackers come in different forms, but they are all after your online privacy and security - especially on social media. There are several things you can do to protect your Facebook and Twitter accounts.

 

Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says

Posted on Friday August 16, 2019  |  google, security

A new Google study this week confirmed the obvious: internet users need to stop using the same password for multiple websites unless they're keen on having their data hijacked, their identity stolen, or worse. From a report: It seems like not a day goes by without a major company being hacked or leaving user email addresses and passwords exposed to the public internet. These login credentials are then routinely used by hackers to hijack your accounts, a threat that's largely mitigated by using a password manager and unique password for each site you visit. Sites like "have I been pwned?" can help users track if their data has been exposed, and whether they need to worry about their credentials bouncing around the dark web. But it's still a confusing process for many users unsure of which passwords need updating. To that end, last February Google unveiled a new experimental Password Checkup extension for Chrome. The extension warns you any time you log into a website using one of over 4 billion publicly-accessible usernames and passwords that have been previously exposed by a major hack or breach, and prompts you to change your password when necessary. The extension was built in concert with cryptography experts at Stanford University to ensure that Google never learns your usernames or passwords, the company says in an explainer. Anonymous telemetry data culled from the extension has provided Google with some interesting information on how widespread the practice of account hijacking and non-unique passwords really is.

 

4 easy ways to wipe data from your phone

Posted on Wednesday August 14, 2019  |  security, android, smartphone, encryption, device, factory reset, data wipe

The smartphone has become an important part of our lives and is one gadget that many of us carry most of the time. We not only use it to communicate with others, but to store personal information like email, photos, and contacts, as well. So if you plan to sell your phone or give it to someone else, make sure you erase everything that's stored there.

 

Vulnerability in Microsoft CTF Protocol Goes Back To Windows XP

Posted on Tuesday August 13, 2019  |  bug, security, windows

CTF, a little-known Microsoft protocol used by all Windows operating system versions since Windows XP, is insecure and can be exploited with ease. From a report: According to Tavis Ormandy, a security researcher with Google's Project Zero elite security team and the one who discovered the buggy protocol, hackers or malware that already have a foothold on a user's computer can use the protocol to take over any app, high-privileged applications, or the entire OS, as a whole. Currently, there are no patches for these bugs, and a quick fix isn't expected, as the vulnerabilities are deeply ingrained in the protocol and its design. What CTF stands is currently unknown. Even Ormandy, a well-known security researcher, wasn't able to find what it means in all of Microsoft documentation. What Ormandy found out was that CTF is part of of the Windows Text Services Framework (TSF), the system that manages the text shown inside Windows and Windows applications. When users start an app, Windows also starts a CTF client for that app. The CTF client receives instructions from a CTF server about the OS system language and the keyboard input methods. It is unclear how Microsoft will patch the CTF problem.

 

The risks of jailbreaking your iPad

Posted on Monday August 12, 2019  |  iphone, ipad, security, malware, apple, ios, spyware, jailbreak, app store

While the iPad and other Apple devices allow you to download and install literally millions of apps, they don't exactly leave much room for customization. Jailbreaking lets you fully customize your iPad by enabling you to install third-party apps on your device. But it's not without risks. Here's why you should think twice before jailbreaking your iPad.

 

Page:   1234567891011121314151617181920212223242526272829303132333435363738394041424344454647

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016