3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0

Posted on Monday November 30, 2015

Revision Note: V1.0 (November 30, 2015): Advisory published.
Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used to issue other certificates, impersonate other domains, or sign code. In addition, these certificates could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against Dell customers. This issue affects all supported releases of Microsoft Windows. Microsoft is not currently aware of attacks related to this issue.

 

Samsung Pay expands payment options

Posted on Friday November 27, 2015

AndroidPhone_Nov5_AMobile payment systems have been making great strides in recent years, and are quickly becoming the norm for consumers looking to quickly settle bills for small amounts. While Google Wallet and Apple Pay may be leading the movement to disrupt the payments industry and make the most of NFC technologies, Samsung's own mobile payment solution is also beginning to make inroads. The latest news that Samsung Pay has added support for eight more credit and debit card issuers will take progress up a notch.

 

4 facts about HIPAA and your IT

Posted on Friday November 27, 2015

While HIPPA's implementation in relation to technology has been problematic to say the least, things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn't necessarily through negligence on your part, but rather simply a lack of understanding as to the requirements. We look at four facts your practice should know about HIPAA and your IT.

 

Your guide to smart BI planning

Posted on Monday November 16, 2015

You have finally decided your small or medium-sized business is ready to utilize Business Intelligence (BI) software. This is a big step for your company and one that must be approached with diligence. If you are not careful the cost of BI software, not to mention training, could far outweigh the actual benefits you end up receiving. However, with thoughtful BI planning, you are likely to see results you would have never thought possible.

 

3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0

Posted on Tuesday November 10, 2015

Revision Note: V1.0 (November 10, 2015): Advisory published.
Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security update to protect customers. The update prevents guests on a Hyper-V system from triggering a weakness in the CPU that could allow instructions from a Hyper-V guest to place its Hyper-V host's CPU into an unresponsive state, leading to a denial of service condition for the guest operating systems running on the affected host. Successful exploitation of the CPU weakness would require kernel-mode code execution privileges on the guest operating system.

 

Boring brands can succeed on social media

Posted on Monday November 09, 2015

164_A_SMFor many business owners who have dabbled in social media, they may think their efforts have been in vain and growing a large social media presence is impossible. They may go as far to believe that social media simply doesn't work, especially when you don't have an exciting brand like Nike or Google. The truth is you can succeed with social media, even if you have a boring brand. And here is one company that is doing just that.

 

Page:   1...338339340341342343344345346...350

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016