Making sure your website is updated with the latest patches is very important as new vulnerabilities are discovered almost daily – so what happens when the latest update stops your updates from working? On Monday, WordPress released version 4.9.3. The very next day, WordPress released version 4.9.4. Although version 4.9.3 fixed 34 bugs, it also… Read more »
Blog
Spectre? Meltdown? Should you throw out your computers?
Meltdown and Spectre are the latest named vulnerabilities to appear in the news and they are in fact very problematic because the attacks could be used to read system memory that *should* have been inaccessible. What happens is an attacker could steal sensitive information such as passwords or encryption keys from your computer’s memory. And… Read more »
Your Next Password May Be Stored in Your Shirt Cuff
Researchers at the University of Washington are trying to store small amounts of data on smart fabrics. These magnetized garments would be readable by a magnetometer and not need any electronics or batteries to function. This would be useful for invisibly labeling items or using clothing or accessories in place of a password or… Read more »
Are you a government contractor? Are you compliant with NIST 800-171?
In December 2015 (2 years ago), DFARS 225.204-7012 required DoD contractors to implement NIST 800-171 “as soon as practical, but not later than December 31, 2017. That is this month! This deadline is now less than 30 days away, and many contractors are not complaint. What is worse, is that many have not taken steps… Read more »
The Holiday Season Is Scammer Heaven
It’s the Holiday Season once again, but remember it is also a holiday for the bad guys as well, but not in the way you might think. Hackers go into scam-overdrive mode during this time of the year to prey on the heavy shopping done by consumers. This time of year is the busiest… Read more »
iPhone “i” Problem Solution
If you have an iPhone and you’re having the issue where “i” gets replaced with weird characters, here is the fix: Go to Settings Go to General Go to Keyboard Go to Text Replacement Tap + in the top right corner Type lower case i on the phrase line & capital I on the shortcut… Read more »
What is the KRACK Attack and Are You Safe?
Most of us have been using wireless networks (Wi-fi) daily for years, but you may not know that every one of your wireless devices is currently at risk of being hijacked. Wireless networks previously used a protocol known as WEP, which was insecure, resulting in the creation of WPA2. WPA2 was supposed to protect networks… Read more »
Why you Should Consider VoIP
Voice over Internet Protocol, more often referred to as VoIP or Voice over IP is a technology that utilizes your internet connection to make and receive phone calls. VoIP is a popular technology option among small to medium sized business to replace their traditional phone system or landlines since it provides more features and cost… Read more »
Want to improve cybersecurity? Try phishing your own employees
Spear phishing campaigns make up 90% of cyberattacks and most employees are still unable to discern these scams from innocent emails. If you want to improve your company’s cybersecurity education, you might want to consider phishing your own staff. Before making the campaign public, companies should take a baseline measurement of how employees react to… Read more »
5 Awesome Windows® Features You Never Knew Existed
1. Window Shake and Shrink If you’ve ever worked within multiple Microsoft® windows, you know that bouncing back and forth between them can be a pain. To fix this, click on and hold the title bar of a program and give it a little shake with your mouse. All other windows will minimize, and the… Read more »