Month: December 2018

Can malware physically damage a computer?

Can malware physically damage a computer?

The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...

/ December 19, 2018 / 2 Comments
Definition of hybrid cloud computing is rapidly evolving

Definition of hybrid cloud computing is rapidly evolving

There may never come a day when all application workloads run in a public cloud. However, the rate at which application workloads will shift towards public clouds appears to be poised to accelerate in the next few years.

/ December 18, 2018
Don’t turtle up, take charge

Don’t turtle up, take charge

On paper, every business wants to be a leader. You want to lead your category, your industry, and your region. You want to be number one and reap all of the benefits with rising to the top of a competitive...

/ December 17, 2018
Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?

Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?

Q: I have some customers with fairly large networks, and one of them is a business college. It seems like all those latent CPUs would be an attractive target for cryptominers. We’ve been taking steps to protect them, but I’m...

/ December 17, 2018
Tech Time Warp: Patent issued for Williams Tube, an early form of RAM

Tech Time Warp: Patent issued for Williams Tube, an early form of RAM

After World War II, British electrical engineer Frederic Williams found himself on the hunt for his next project. During the war, he had developed radar technology that could identify friendly aircraft, using “Friend or Foe,” or IFF, radar. So, what...

/ December 14, 2018
How MSPs can find cloud pricing bargains

How MSPs can find cloud pricing bargains

Years ago, Filene’s department store in Downtown Boston had a “bargain basement” where clothing and items that weren’t selling in the main store got deeply discounted to move them out. It worked beautifully as people loved digging through bins for...

/ December 14, 2018
Linux Foundation is looking for a few good MSPs with networking expertise

Linux Foundation is looking for a few good MSPs with networking expertise

The Linux Foundation is looking for managed service providers (MSP) and systems integrators to start contributing to multiple projects seeking to transform networking using open source code.

/ December 13, 2018
Five MSP security predictions for 2019

Five MSP security predictions for 2019

The champagne hasn’t been purchased, the noisemakers are still in storage, and the ball in Times Square hasn’t fallen to usher in 2019 yet. The ball is operated and dropped using a computer network, one that we hope is well...

/ December 12, 2018
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects

Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects

What is the Issue? Security firm Snyk has disclosed a widespread and critical flaw in multiple archive file-extraction libraries found in thousands of open-source web application projects from HP, Amazon, Apache, Oracle, LinkedIn, Twitter and others. Zip Slip is a...

/ December 11, 2018
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators

Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators

What is the Issue: On Tuesday May 29, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a comprehensive report on malware associated with North Korean Government cyber activity. The report details a remote access tool...

/ December 11, 2018