Month: December 2018
Can malware physically damage a computer?
The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...
Definition of hybrid cloud computing is rapidly evolving
There may never come a day when all application workloads run in a public cloud. However, the rate at which application workloads will shift towards public clouds appears to be poised to accelerate in the next few years.
Don’t turtle up, take charge
On paper, every business wants to be a leader. You want to lead your category, your industry, and your region. You want to be number one and reap all of the benefits with rising to the top of a competitive...
Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?
Q: I have some customers with fairly large networks, and one of them is a business college. It seems like all those latent CPUs would be an attractive target for cryptominers. We’ve been taking steps to protect them, but I’m...
Tech Time Warp: Patent issued for Williams Tube, an early form of RAM
After World War II, British electrical engineer Frederic Williams found himself on the hunt for his next project. During the war, he had developed radar technology that could identify friendly aircraft, using “Friend or Foe,” or IFF, radar. So, what...
How MSPs can find cloud pricing bargains
Years ago, Filene’s department store in Downtown Boston had a “bargain basement” where clothing and items that weren’t selling in the main store got deeply discounted to move them out. It worked beautifully as people loved digging through bins for...
Linux Foundation is looking for a few good MSPs with networking expertise
The Linux Foundation is looking for managed service providers (MSP) and systems integrators to start contributing to multiple projects seeking to transform networking using open source code.
Five MSP security predictions for 2019
The champagne hasn’t been purchased, the noisemakers are still in storage, and the ball in Times Square hasn’t fallen to usher in 2019 yet. The ball is operated and dropped using a computer network, one that we hope is well...
Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects
What is the Issue? Security firm Snyk has disclosed a widespread and critical flaw in multiple archive file-extraction libraries found in thousands of open-source web application projects from HP, Amazon, Apache, Oracle, LinkedIn, Twitter and others. Zip Slip is a...
Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators
What is the Issue: On Tuesday May 29, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a comprehensive report on malware associated with North Korean Government cyber activity. The report details a remote access tool...