Category: Featured
Tech Time Warp: Everybody was kung fu fighting
This week’s Tech Time Warp goes back twenty-nine years ago, when one of the more convoluted chapters in technology history was being written. Research scientist Tsutomu Shimomura was enjoying a Christmas vacation in Lake Tahoe when he received a troubling...
Five powerful security tips for keeping data secure this Christmas
Keeping your data safe over Christmas is as important as ever. We’ll assume you’ve already done this for your business, but what about your household? That’s why we’ve pulled together a selection of seasonal security tips for you to keep...
Tech Time Warp: Father Christmas leaves a lump of coal for NASA
These days, there seems to be a festive seasonal version of everything. Even items you never dreamed possible (such as cat litter). Malware is no exception. In this edition of Tech Time Warp, we look back at 35 years ago,...
Cybersecurity Threat Advisory: Google OAuth vulnerability
In this Cybersecurity Threat Advisory, we’re looking at a critical Google OAuth vulnerability that allows ex-employees to maintain access to applications such as Slack and Zoom. After off boarding, attackers can achieve access by creating non-Gmail accounts using corporate email...
A look back at the top cybersecurity trends of 2023
December is the time when we pause and reflect on the past year. Keeping with the mantra that the past is a prologue, looking at what occurred may help us understand and prepare for what is coming. This week, we’re...
AI is on track to transform managed services in 2024
Artificial intelligence is all the rage these days, but many managed service providers (MSPs) have been making use of it in some capacity for years. The main difference is with the rise of generative AI. It’s now becoming possible to...
Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX
3CX advised customers that the SQL database integration has been disabled due to CVE-2023-49954. Businesses that use MongoDB or any of their web-based customer relationship management (CRM) integration templates are not affected. Read this Cybersecurity Threat Advisory to gain details...
Cybersecurity Threat Advisory: End-of-Life firewalls actively exploited
Sophos recently addressed a critical vulnerability CVE-2022-3236 involving end-of-life (EOL) firewalls that had been actively exploited. The vulnerability prompted Sophos to release patches for unsupported firewalls after reports of successful attacks on these systems surfaced. Read this Cybersecurity Threat Advisory...
Tech Time Warp: Public sees glimpse of computing’s future on TV
In this edition of Tech Time Warp we see how sixty-nine years ago this week, the public got a televised glimpse of computing innovations we now take for granted. On Dec. 14, 1954, legendary journalist Edward R. Murrow featured the...
