A proactive approach to more secure code

Posted on Tuesday July 16, 2019

What if we could eliminate an entire class of vulnerabilities before they ever happened? Since 2004, the Microsoft Security Response Centre (MSRC) has triaged every reported Microsoft security vulnerability. From all that triage one astonishing fact sticks out: as Matt Miller discussed in his 2019 presentation at BlueHat IL, the majority of vulnerabilities fixed and...

 

Beware of distributed spam distraction

Posted on Monday July 15, 2019

It's frustrating to receive dozens of spam messages in your email inbox. Spam mail is so easy to delete, which is why most people think it's just a harmless annoyance. But hackers have devised a way to make use of spam mail for criminal purposes. It's called distributed spam distraction, and here's what you need to know about it.

 

What Google Assistant can do for you

Posted on Friday July 12, 2019

Before there was Google Assistant, there was Google Now. In 2016, it replaced Google Now as the virtual assistant (VA) in the Google app for Android and iOS. The updated VA offers plenty of functionalities to Google device users. Here are a few that you should take advantage of.

 

Is virtualization right for your company?

Posted on Thursday July 11, 2019

Virtualization has become a popular solution for many businesses to back up servers, upgrade hardware, or move to the cloud. Deploying virtualized systems has proven cost-effective and efficient for many companies, but is it right for your organization? Here are some factors you ought to consider.

 

Malicious Apps Infect 25 Million Android Devices With 'Agent Smith' Malware

Posted on Thursday July 11, 2019

An anonymous reader quotes a report from Phys.Org: Malicious apps from a campaign called "Agent Smith" have been downloaded to 25 million Android devices, according to new research by cyber-security firm Check Point. The apps, most of them games, were distributed through third-party app stores by a Chinese group with a legitimate business helping Chinese developers promote their apps on outside platforms. Check Point is not identifying the company, because they are working with local law enforcement. About 300,000 devices were infected in the U.S. The malware was able to copy popular apps on the phone, including WhatsApp and the web browser Opera, inject its own malicious code and replace the original app with the weaponized version, using a vulnerability in the way Google apps are updated. The hijacked apps would still work just fine, which hid the malware from users. Armed with all the permissions users had granted to the real apps, "Agent Smith" was able to hijack other apps on the phone to display unwanted ads to users. That might not seem like a significant problem, but the same security flaws could be used to hijack banking, shopping and other sensitive apps, according to Aviran Hazum, head of Check Point's analysis and response team for mobile devices. There was also a "dormant" version of "Agent Smith" in 11 apps on the Play Store, which could have been triggered into action by a banner ad containing the keyword "infect." The apps have since been removed from the Play Store, but had over 10 million downloads.

 

4 Free Google apps you need on your device

Posted on Wednesday July 10, 2019

Did you know that Google offers more than just Gmail, Maps, and YouTube? A quick browse through Google Play will introduce you to a host of apps that can make your life easier. Window shopping at the Google store, however, means an inundation of productivity-destroying entertainment apps, and you probably have no time to sift through them all. But we do, so make room on your device for these four extremely useful Google tools.

 

Page:   1...168169170171172173174175176...350

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016