Knowledge is a powerful defense. Check out these trending scams Trending scams Tech support scams “They needed remote access to remove a virus from my device” How it works: Help protect yourself and your money No matter the reason given, be cautious about granting device access or downloading unfamiliar apps to fix issues with your […]
You are browsing archives for
Category: General IT News
We provide you the important tech, cyber news, and important cyber events. Cyber-security threats and vulnerabilities are threats.
Developments of Quantum computing
Quantum computing, developed by companies like IBM and Google, promises to solve complex problems in minutes, surpassing today’s supercomputers. Highlights Key Insights of Quantum computing
Safeguarding Your Business
Safeguarding Your Business Safeguarding Your Business is critical to most businesses. Did you know that cybersecurity breaches are projected to cost $10.5 trillion by 2025? Fully automated AI ransomware businesses are being sold on the Dark Web, targeting small businesses. Business owners need to view cybersecurity as an investment in protecting their business and clients, […]
7 critical password rules to practice
There are 7 critical password rules to practice. in your daily lives. For an in-depth understanding of digital security, consider reading the four-volume Digital Identity Guidelines by the National Institute of Standards and Technology (NIST). Although it’s a comprehensive document primarily tailored for Federal agencies requiring highly robust security measures, it also includes a wealth […]
What should you do if you get a pop-up message?
Here’s how to prevent pop-ups from causing harm to your system What never to do when you see a pop-up message It’s crucial to be cautious with pop-up messages, as scammers often use them to trick you into downloading malware or revealing personal information. Your instinct to pause and assess the situation is correct. However, […]
Immutability with Fortified Copies
US Service Center Fortified Copies offer a fresh approach to immutability—protecting servers, workstations, and Microsoft 365 backups, without compromising the ease-of-use US Service Center is known for. Immutability became a hot topic in the data protection space when ransomware groups started targeting backups to thwart victims’ recovery attempts. What is Immutable Data Backup? “Immutable” simply […]
Broad VMware Changes
You may already have heard about the acquisition of VMware by Broadcom. High-level summary? They’ve decided to end the sale of perpetual licenses for VMware products, moving to a subscription model/bundling, and reducing the number of Resellers and Cloud Service Providers. Existing contracts will continue to receive support as outlined in their contractual commitments, but […]
Google and Yahoo are upping their game in 2024
In the on-going battle against spam, Google and Yahoo have announced new standards for 2024 which will help protect their inboxes and reduce spam intrusions. This is great news for legitimate email senders who abide by email best practices. Your business will need to adapt to these new standards or risk non-delivery to the users’ […]
Virtual Kidnapping
Be aware of a New Twist on a Frightening Scam — Virtual Kidnapping. The FBI reports this crime is on the rise. Below are some ways to protect yourself. Don’t Become a Victim The success of any type of virtual kidnapping scheme depends on speed and fear. Criminals know they only have a short time […]
‘Juice Jacking’: The Dangers of Public USB Charging Stations
Juice Jacking and the dangers of Public USB Charging Stations. Are you planning a trip? If so, it’s likely that you’ll bring along your cell phone or another portable device that will need recharging at some point. However, if your battery is low and you plan to use a free USB port charging station, such […]
Windows 8.1 End of Life
Windows 8.1 support will end on January 10, 2023 As a reminder, Windows 8.1 will reach end of support on January 10, 2023, at which point technical assistance and software updates will no longer be provided. If you have devices running Windows 8.1, we recommend upgrading them to a more current, in-service, and supported Windows […]
Dymo Printer Proprietary Labels
Dymo Printer Proprietary Labels have RFID chips. This means you are required to purchase Dymo brand labels to run on these news Dymo printers. If you are using custom labels, avoid purchasing the Dymo 550, Dymo 550 Turbo, and Dymo 5XL printers. These printers ONLY use proprietary Dymo labels. These labels have an RFID chip […]
McAfee Agent bug lets hackers run code with Windows SYSTEM privileges
Bleeping Computer’s article from January 21, 2022, states the following: McAfee Enterprise (now rebranded as Trellix) has patched a security vulnerability discovered in the company’s McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges. McAfee Agent is a client-side component of McAfee ePolicy Orchestrator (McAfee ePO) that […]
3G Networks are shutting down in 2022
From the FCC: If your mobile phone is more than a few years old, you may need to upgrade your device before your mobile provider shuts down its 3G network, to avoid losing service. For more information on your mobile providers’ plans for 3G retirement and how you can prepare, contact your provider directly. What […]
Microsoft says M365, cloud services inaccessible due to Azure AD outage
Does not affect users with already active sessions. Microsoft has confirmed issues with its Azure Active Directory service that are preventing a number of users from authenticating to gain access to cloud-based applications and services. The company said in a status advisory that “customers using Azure Active Directory or Microsoft Account may experience authentication issues […]
Tell Apple: Don’t Scan Our Phones
Apple has abandoned its once-famous commitment to security and privacy. The next version of iOS will contain software that scans users’ photos and messages. Under pressure from U.S. law enforcement, Apple has put a backdoor into their encryption system. Sign the EFF petition and tell Apple to stop its plan to scan our phones. Users […]
Turn off, turn on: Simple step can thwart top phone hackers
“At a briefing by security staff this year, he said he got some advice on how to help keep his cellphone secure. Step One: Turn off phone. Step Two: Turn it back on. That’s it. At a time of widespread digital insecurity it turns out that the oldest and simplest computer fix there is — […]
Is your printer tracking you?
The tracking is almost invisible but contain a hidden code. These “microdots” are well known to security researchers and civil liberties campaigners. Many color printers add them to documents without people ever knowing they’re there. The EFF (Electronic Frontier Foundation) has a no longer updated list of printers. It is referenced in the article. Article: […]
Tired of robocalls on your mobile phone?
The new FCC STIR/SHAKE framework is effective on 06/30/2021. The FCC is forcing providers to authenticate and verify each call. This standard framework will help with spoofed called by authenticating each caller ID. This will significantly reduce/eliminate the robocalls and illegally spoofed calls. If your service does not comply, then the calls would be […]
Western Digital Users Urged to Unplug Devices from Internet
Western Digital is urging users their MyBook Live brand of network storage drives to disconnect them from the Internet. They are warning of malicious hackers are remotely wiping the drives by a previously unknown critical flaw that can be activated by anyone who knows the IP address of an affected device. On June 24, the […]