Category Archives: Uncategorized
Recent Plex Vulnerability Allows Full System Takeover
Recently it was found that Plex had a vulnerability that allowed hackers to do a full system takeover. The three vulnerabilities that were found are CVE-2020-5740, CVE-2020-5741, and CVE-2020-5742 which was detected by Tenable security researcher Chris Lyne and reported to Plex on May 31st. If hackers are able to exploit this vulnerability they could execute code…
Amazon Phishing Emails Are Running Rampant
Amazon phishing emails are running rampant. These hackers are using these types of phishing emails to try and gain access to your account and information and use it to purchase items with. Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the…
Tech Tools For Beginners
Package Contents: 2 x Plastic Opening Tools 3 x ESD Tweezers 1 x Utility Knife 1 x Anti-Static Wrist Strap 1 x SIM Card Ejector Pin and LCD Suction Cup 4 x Triangle Plectrums 2 x Plastic Spudgers 3 x Metal Spudgers 1 x Tin Scraper 1 x Large Plastic Double Headed Opening Tool 1…
Many Critical Vulnerabilities In VNC
Many critical vulnerabilities found in Virtual Network Computing (VNC). The VNC software was found to have 37 different memory corruption vulnerabilities and many of these could result in remote code execution. The researchers at Kaspersky said around 600,000 web-accessible servers use the code. Kaspersky researchers wrote in an analysis of the bugs for ICS CERT, released…
The Benefits Of Managed IT Service Providers
Managed IT Services is a term that refers to the practice of outsourcing your company’s IT computer network support and management to improve business operations. Companies that provide these managed services are called Managed Services Providers (MSP). These MSP companies would take the place of a full-time IT professionals that you would normally have on…
Your vCIO Should Achieve These 10 Technology Priorities For 2020
There are 10 priorities that your vCIO should accomplish for 2020. But if your not sure what a vCIO is or does the term “vCIO” stands for “virtual Chief Information Officer” – basically an outsourced IT department or department head. The idea of outsourced IT is becoming more viable throughout the business world. After all, if…
Microsofts April 9th security update impacts some antivirus software vendors
People have been noticing that Microsoft’s recent April 9th security update is causing some problems with a few antivirus vendors like Sophos, Avira, Avast, McAfee and some others.
Microsoft Outlook.com Email Accounts Breached By Hackers
Many users received a notification from Microsoft Outlook.com letting them know about accounts being breached by hackers. A Motherboard report said that the breach is “much worse” than what was reported. The hackers were able to access emails and attachments and that the hackers were able to access a large number of Outlook, MSN and…
Say Goodbye Google+
Recently on January 30th 2019 Google has announced that they will be shutting down Google+ on April 2, 2019. Google’s Letter Below In December 2018, we announced our decision to shut down Google+ for consumers in April 2019 due to low usage and challenges involved in maintaining a successful product that meets consumers’ expectations. We want to…
Top Worst Passwords Of All Time
Take security serious, here is a lists of the top 500 worst passwords. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds…