Category: Featured
Pioneers in Tech: Kao Chung-chin and Lois Lew, who brought IBM’s typewriter to China
In today’s globalized, always-connected society, another innovation we take for granted is the universality of computers despite language differences. And some of us in English-speaking countries will even go a step further and assume computers all over the world have...
MSPs can create value amid growing cloud costs
A survey of 100 vice presidents from organizations with more than 1,000 employees suggests a need for increased visibility into cloud spending. This has become a major opportunity for managed service providers (MSPs) that have cloud expertise. Conducted by Vega...
Voice cloning – a growing cybersecurity threat
Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...
Cybersecurity Threat Advisory: Critical PaperCut vulnerability actively exploited
A new vulnerability, CVE-2023-27350, has been discovered which affects PaperCut MF and NG print management software. Successful exploitation of the vulnerability would allow attackers to access sensitive user information (usernames, email addresses, office/department information, and card numbers) without authentication. A...
Tech Time Warp: Could I have email, texts, and spam, without the spam?
This week’s Tech Time Warp is all about “spam.” Spam can now be used as a noun or verb and even has an adjectival form: “spammy.” And to think, not long ago it was solely canned meat! So how did...
Tech Time Warp: The ANIMAL instinct to do good
If you have ever dabbled in Dungeons & Dragons, you are familiar with the “alignment system,” which is a way to chart characters’ tendency toward good vs. evil as well as their inclination to follow rules (“lawful” vs. “chaotic”). With...
Cybersecurity Threat Advisory: EvilExtractor malware surge detected
EvilExtractor malware has spiked in Europe and the US. EvilExtractor is distributed through phishing campaigns and can harvest various types of data, including browser history, passwords, and cryptocurrency wallets. This is a concern because of the malware’s ability to evade...