Category: Featured

Tech Time Warp: Sneaky SirCam worm slithers through inboxes

Tech Time Warp: Sneaky SirCam worm slithers through inboxes

When it comes to use of social engineering in malware, the SirCam worm must be among the most insidious. The worm propagated itself in the usual way via email attachment. But SirCam didn’t carry a new email attachment—the typical “invoice”...

/ July 16, 2021
Pioneers in Tech: Margaret Hamilton’s moonshot

Pioneers in Tech: Margaret Hamilton’s moonshot

NASA estimates 400,000 individuals contributed to Neil Armstrong and Buzz Aldrin’s ability to land on the moon on July 20, 1969. One of them was Margaret Hamilton, a 32-year-old software engineer working at MIT. Hamilton developed the software system that...

/ July 9, 2021
How to write a sales email to prepare prospects to talk

How to write a sales email to prepare prospects to talk

Despite a wave of technology-driven sales tactics, email still remains an effective marketing tool in terms of return on investment (ROI) for small to medium-sized MSPs. Even though any MSP can say they know How to Write a Sales Email,...

/ July 6, 2021
Tech Time Warp: The Speak & Spell, far more than a toy

Tech Time Warp: The Speak & Spell, far more than a toy

Readers of a certain age will recall the Speak & Spell, a Texas Instruments toy that would impress no child of today, but has earned its rightful place in history as the first consumer product to use digital signal processing...

/ July 2, 2021
Tech Time Warp
Tech Time Warp: The Pikachu virus is not your friend

Tech Time Warp: The Pikachu virus is not your friend

It sounds so innocent: An email appears in your inbox, subject line “Pikachu Pokemon.” The message speaks of friendship and invites you to visit Pikachu on his website. And the attachment (warning bells going off yet?) features an animation of...

/ June 25, 2021
Tech Time Warp: Stuxnet takes malware to the next level

Tech Time Warp: Stuxnet takes malware to the next level

Today’s action movies and thrillers routinely feature some hacker-type who—armed with a laptop in a chunky military-grade case—can infiltrate the most impenetrable of digital fortresses in a few furious keystrokes. But in the real-life case of Stuxnet, first detected in...

/ June 18, 2021 / 8 Comments
Rising travel brings increased cybersecurity risks

Rising travel brings increased cybersecurity risks

With the pandemic easing considerably in the United States and receding in other countries, business travel is starting to return to pre-pandemic levels. But normal travel can also bring with it a host of cybersecurity dangers. Forbes Magazine illustrated the...

/ June 16, 2021
Pioneers in Tech: Remembering the life of Alan Turing

Pioneers in Tech: Remembering the life of Alan Turing

The life of Alan Turing —the man who broke the Nazi Enigma code in World War II, providing the intelligence that led the Allies to victory—is one of many wrenching stories to be remembered during Pride Month, the annual remembrance...

/ June 11, 2021
Tech Time Warp: ExploreZip worm cleans out Microsoft Office files

Tech Time Warp: ExploreZip worm cleans out Microsoft Office files

Just a few months after the Melissa virus attacked computers, wreaking an estimated $80 million in damage, the ExploreZip worm began zipping through computers across the globe, destroying any Microsoft Office files in its path. First detected in June 1999,...

/ June 4, 2021
Social media – an MSP’s friend or foe?

Social media – an MSP’s friend or foe?

For MSPs, the power of social media cannot be underestimated. This is a double-edged sword: although social media can be a strong positive force, it is also an easy way to lose the hard-won trust of your customers in a...

/ May 31, 2021