New Mac malware linked to DNC hacking group

Posted on Thursday March 02, 2017

2017Mar2Apple_AFancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a Mac or an iOS device, here are some crucial details about the new malware.

 

Introducing Cloud Search for G Suite users

Posted on Wednesday March 01, 2017

170px_shutterstock_426495721Google Cloud Search is the latest tool launched for business customers that allow users to search across their G Suite products including Drive, Gmail, Sites, Calendar, Docs, Contacts and more. It was previously available in a limited preview, named Springboard, and was described as something similar to Google Now for enterprise workers.

 

Advice from a failed disaster recovery audit

Posted on Tuesday February 28, 2017

2017February28_Business_AWe can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it's all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

 

Vulnerabilities on WordPress websites

Posted on Monday February 27, 2017

2017February27_WebandCloud_A"Easy-to-use," "SEO-friendly," "open-source," and "customizable." These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, "easy to target," "hackers' favorite," and "prone to attacks" could soon be used to define the experience of running a WordPress website.

 

The right social media platforms for SMBs

Posted on Friday February 24, 2017

170px_shutterstock_231341854Social media marketing is tricky, to say the least. It's difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn't mean it will suit your organization. Instead, business owners should familiarize themselves with all the available options.

 

Are your printers safe?

Posted on Thursday February 23, 2017

2017February23_Hardware_AThis is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers' capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed Denial-of-Service and other types of attacks. Let's take a look at this chilling development in cybersecurity.

 

Page:   1...286287288289290291292293294...353

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016