Month: April 2019

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Windows Desktop Shortcut Hijack

Cybersecurity Threat Advisory: Windows Desktop Shortcut Hijack

What is the Issue: Security researchers have discovered a new attack technique utilizing Microsoft Word, macros and your desktop shortcuts. Utilizing a malicious macro embedded within a Word document, desktop shortcuts are modified to download malware when you click on...

/ April 20, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Unprotected Marketing Database Exposes PII

Cybersecurity Threat Advisory: Unprotected Marketing Database Exposes PII

What is the Issue? On June 27th, an unprotected database belonging to a marketing firm containing 340 million records exposed to the internet was discovered. The database was found by an independent research firm. Why is this noteworthy? The unprotected...

/ April 19, 2019
Tech Time Warp: The hidden surprises of technology Easter eggs

Tech Time Warp: The hidden surprises of technology Easter eggs

Have you ever typed “answer to life, the universe, and everything” into Google? In a nod to The Hitchhiker’s Guide to the Galaxy, Google returns “42” as a calculator result. Or perhaps you’ve noticed a white X in front of...

/ April 19, 2019
MSPs can use their skills to give back to the community

MSPs can use their skills to give back to the community

Earlier this month, I got word that a local company I hadn’t heard of was doing an electronics recycling day. It’s the type of thing where you bring in your old computers, external hard drives, and other things like that,...

/ April 19, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Necurs Malware Bypassing Conventional Detection Methods

Cybersecurity Threat Advisory: Necurs Malware Bypassing Conventional Detection Methods

What is the Issue? It has been discovered by Trend Micro that the Necurs malware, which was previously revealed as an internet shortcut, has now been found under the veil of the internet query file. These files innocently and typically...

/ April 18, 2019
Sizing up the scope of the 5G networking opportunity for MSPs

Sizing up the scope of the 5G networking opportunity for MSPs

There’s a lot of buzz and excitement these days around 5G wireless networks. Over the next several years, the availability of more bandwidth will drive adoption of a variety of emerging use cases. These use cases will involve everything from...

/ April 18, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Mylobot Malware Brings New Sophistication to Botnets

Cybersecurity Threat Advisory: Mylobot Malware Brings New Sophistication to Botnets

What is the Issue? Researchers have discovered a New Windows malware whose origin traces back to the ‘Dark Web.’ The malware, dubbed Mylobot, pulls together a variety of strategies and techniques to gain a foothold on its targets and remain...

/ April 17, 2019
Wipro breach and how MSPs can avoid the same fate

Wipro breach and how MSPs can avoid the same fate

Wipro, one of India’s largest and most successful MSPs, recently fell victim to a hack that was accomplished via a phishing campaign. After gaining entry to Wipro’s network “for some time,” the hackers were able to launch cyber attacks against...

/ April 17, 2019
Human vulnerability is the biggest cybersecurity threat

Human vulnerability is the biggest cybersecurity threat

The culture of cybersecurity has been training its weapons in the wrong direction, according to Dr. Arun Vishwanath, the chief technologist at Avant Research Group and a former professor at the University at Buffalo. While ransomware, spearphishers, and general hackers...

/ April 17, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: MacOS Bypass Flaw Lets Attackers Sign Malicious Code as Apple

Cybersecurity Threat Advisory: MacOS Bypass Flaw Lets Attackers Sign Malicious Code as Apple

What is the Issue: Due to a flaw in Apple’s code-signing API, hackers have been able to manipulate the code-signing process to enter malicious code into MacOS systems. Third-party security tools were unable to detect the issue as the malicious...

/ April 16, 2019