The Latest in Tech Today

Insecurity Strike Again – Major MSP Hack

Insecurity Strike Again – Major MSP Hack

Insecurity Strike Again - Major MSP Hack   Hackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider. According to the popular investigator Brian Krebs, the attackers gained access to email and file sharing systems for...

read more
Got Chinese Security Cameras?  Just Try to Remove them.

Got Chinese Security Cameras? Just Try to Remove them.

Got Chinese Security Cameras? Just Try to Remove them.   U.S. federal agencies have five weeks to rip out Chinese-made surveillance cameras in order to comply with a ban imposed by Congress last year in an effort to thwart the threat of spying from Beijing. But...

read more
Hollywood Could Hit the Skids with Virtual Stars

Hollywood Could Hit the Skids with Virtual Stars

Hollywood on the Skids with Virtual Stars When you’re watching a modern blockbuster such as The Avengers, it’s hard to escape the feeling that what you’re seeing is almost entirely computer-generated imagery, from the effects to the sets to fantastical creatures. But...

read more
Apple has a problem with Zoom and so should you

Apple has a problem with Zoom and so should you

Apple has a problem with Zoom and so should you   After all of the drama over Zoom’s use of a hidden web server on Macs, Apple itself has decided to step in, TechCrunch reports. It is issuing a silent update — meaning your Mac will get it without any interaction...

read more
New MacBooks Coming

New MacBooks Coming

New MacBooks ComingThe “cheap” MacBook Pro—a 13-inch model starting at a mere $1,299—has been refreshed with an 8th-generation, 1.4GHz Intel Core i5 quad-core processor, a welcome upgrade from the 7th-generation, 2.3GHz Intel Core i5 dual-core chip the laptop...

read more
Someone’s Phishing For You

Someone’s Phishing For You

 Someone’s Phishing for You!   Black Hats are out there casting a line for you and hoping to land their “Phish”  This type of social engineering relies on a simple human trait - trust. By playing on this trust, they can manipulate you into falling for their plot...

read more
Hillary Clinton and CyberSecurity — In What Universe?

Hillary Clinton and CyberSecurity — In What Universe?

Hillary Clinton and CyberSecurity — In What Universe?   Former Secretary of State Hillary Clinton withdrew from the cybersecurity conference where she was scheduled to be the keynote speaker, citing an “unforeseen circumstance,” according to an email from the...

read more
What Did You Say?  The Forever Recordings of Alexa

What Did You Say? The Forever Recordings of Alexa

What Did You Say? The Forever Recordings of Alexa   If you (like so many of us) hate listening to recordings of your own voice, you may be in for an unpleasant future, as Amazon has confirmed it hangs on to every conversation you've ever had with an Alexa-enabled...

read more
O365 Non-Security – again

O365 Non-Security – again

O365 Non-Security - again   The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft's Office 365 platform. The UK's National Cyber Security Centre...

read more
Crypto trust is costly and hidden

Crypto trust is costly and hidden

Crypto trust is costly and hidden   The world’s first cryptocurrency ATM opened for business in a Canadian coffee shop on October 29, 2013, and by the end of the day, 81 people had visited the novel machine to trade their cash for bitcoin or vice versa. This...

read more
Are You Ready? Iranian Cyber Counter Attacks

Are You Ready? Iranian Cyber Counter Attacks

Are You Ready? Iranian Cyber Counter Attacks   U.S. businesses should get ready for a barrage of digital retaliation from Iran after the Trump administration launched a cyber attack against the Islamic Republic’s rocket and missile launching systems, current, and...

read more
Cyberbreaches — How far does your liability extend?

Cyberbreaches — How far does your liability extend?

Cyber Breaches -- How Far Does Your Liability Extend?It seems like we read about a major data breach occurring almost every other day. From credit card information and PIN codes stolen from some of the largest retailers in America to very personal health records, data...

read more
What We Know About Apollo Missions After 50 years

What We Know About Apollo Missions After 50 years

What We Know About Apollo Missions After 50 years50 years ago, on July 20, 1969, humanity took our first footsteps on the surface of another world. With Neil Armstrong's small step for a single man, humankind took a great leap forward into the space age, demonstrating...

read more
Trumping Iranian Aggression

Trumping Iranian Aggression

Trumping Iranian Aggression   The US has responded to a recent rise in Iranian cyber-activity and the shooting of an unarmed drone last week by launching cyber-attacks against Iran's military IT systems. The cyber-attacks were carried out by US Cyber Command with...

read more
Is Your App Safe?  Maybe Not!

Is Your App Safe? Maybe Not!

Is That App On Your SmartPhone Safe? Maybe Not!   High-risk vulnerabilities are common across both Android and iOS mobile apps, with Android devices slightly more at risk than their iOS counterparts (43% vs. 38%), according to Positive Technologies'...

read more
Mac Non-Vulnerability Vulnerability

Mac Non-Vulnerability Vulnerability

Mac Non-Vulnerability Vulnerability   Mac malware developers have jumped on a recently disclosed macOS Gatekeeper vulnerability and are actively developing malware that abuses it. The new malware has been named OSX/Linker and has been tied to the same group that...

read more
During Travel Is Your Data Safe from Snooping Eyes?

During Travel Is Your Data Safe from Snooping Eyes?

During Travel Is Your Data Safe from Snooping Eyes?   Visual hacking—when someone can see information on your screen over your shoulder without your knowledge—is a major cybersecurity threat to business travelers, especially in the GDPR era, according to a Monday...

read more
Who has the Moral High Road Google Search or News Media

Who has the Moral High Road Google Search or News Media

Who has the Moral High Road Google Search or News Media Are publishers losing money because of Google and Google's news service? Or are they becoming more profitable? This week, The New York Times accused Google of this. It boils down to an industry report that...

read more
Deep Fakes Are No Laughing Matter

Deep Fakes Are No Laughing Matter

Deep Fakes Are No Laughing MatterIn a video published on YouTube, Game of Thrones actor Kit Harington—in character as Jon Snow—apologized for several mistakes made during the controversial eighth season of the hit HBO show. There’s just one problem: Harington never...

read more