Microsoft Exchange Compromised
Posted by Zac
The issue An exploit within Microsoft’s mail platform, Exchange, has been identified and has used by malicious parties that have resulted in tens of thousands of compromised servers. It is important to note that this vulnerability is isolated to companies and government agencies using self-hosted on premise Exchange server. The attackers discovered and…
Read MoreMalvertising: The Malware Magician
Posted by Geoff Ullrich
One moment, you’re happily browsing a trusted site. A few clicks later and Abracadabra! You’ve left the safety of the secured site and are now somewhere strange where pop-ups shout fake system messages at you. What happened? Maybe you clicked an advertisement, or maybe you simply saw one in the margins of your…
Read MorePhishing: Avoid the Bait
Posted by Geoff Ullrich
Phishing is a funny looking word with serious implications. But what is it? No, it has nothing to do with a ‘80s rock group or aquatic game. It refers to fraudulent electronic correspondence that attempts to steal personal information. These will often appear as though they were from a trusted source in hopes…
Read MoreSmart Homes: A Window into the Future
Posted by Geoff Ullrich
Did you remember to lock the front door? Is the oven still on? Maybe you forgot to turn the thermostat down before your trip and while you were taking it easy, your AC was working overtime. These are problems we’ve all come across and they usually result in a frantic trip back home.…
Read MorePain-in-the-***-word Management
Posted by Geoff Ullrich
It’s time to log into your online bank, or alternate email, or one of the many hundreds of accounts we all have. What was your password again? Your mother’s maiden name and your birthday? Your first pet and your graduation year? Maybe you try to make it easy and use the same password…
Read MoreStaying safe using public WiFi
Posted by Zac
Free wifi is pretty awesome. We count on it to keep our active lives moving and there are no shortages of wireless access points these days. But what do we risk for this ease of access? You might trust that barista with your latte, but can you trust them with your computer’s security?…
Read More