by bct2mastertemp | Mar 23, 2021 | Blog
One of the most frequently heard complaints about Windows has to do with aesthetics. Despite a few seemingly halfhearted attempts to modernize, significant portions of the OS looks and feels like they were designed in the 90’s. That’s because Windows is...
by bct2mastertemp | Mar 22, 2021 | Blog
In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose not to encrypt files and demand payment or cause other...
by bct2mastertemp | Mar 20, 2021 | Blog
Macros have been a simple, effective means of spreading malware since the 1990’s, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It’s a long standing issue that many companies have attempted to address over the years....
by bct2mastertemp | Mar 19, 2021 | Blog
Recently, two different security researchers (Clement Lecigne of Google’s Threat Analysis Group, and Alison Huffman from Microsoft’s Browser Vulnerability Research Group) discovered a pair of serious security vulnerability impacting Apple devices. The...
by bct2mastertemp | Mar 18, 2021 | Blog
There’s a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that makes use of SendGrid and convincing replicas of Outlook on the Web and...
by bct2mastertemp | Mar 17, 2021 | Blog
Microsoft has been busy of late, making a raft of improvements to their email system that are designed to enhance user security. Not long ago, they added a fantastically useful feature called ‘Plus Addressing’ which allows Office 365 users to make use of...