Mar 9

Microsoft Exchange Compromised

Posted by Zac

The issue An exploit within Microsoft’s mail platform, Exchange, has been identified and has used by malicious parties that have resulted in tens of thousands of compromised servers. It is important to note that this vulnerability is isolated to companies and government agencies using self-hosted on premise Exchange server. The attackers discovered and…

Read More

Oct 3

Malvertising: The Malware Magician

Posted by Geoff Ullrich

One moment, you’re happily browsing a trusted site. A few clicks later and Abracadabra! You’ve left the safety of the secured site and are now somewhere strange where pop-ups shout fake system messages at you. What happened? Maybe you clicked an advertisement, or maybe you simply saw one in the margins of your…

Read More

Aug 29

Phishing: Avoid the Bait

Posted by Geoff Ullrich

Phishing is a funny looking word with serious implications. But what is it? No, it has nothing to do with a ‘80s rock group or aquatic game. It refers to fraudulent electronic correspondence that attempts to steal personal information. These will often appear as though they were from a trusted source in hopes…

Read More

May 3

Smart Homes: A Window into the Future

Posted by Geoff Ullrich

Did you remember to lock the front door? Is the oven still on? Maybe you forgot to turn the thermostat down before your trip and while you were taking it easy, your AC was working overtime. These are problems we’ve all come across and they usually result in a frantic trip back home.…

Read More

Jan 13

Pain-in-the-***-word Management

Posted by Geoff Ullrich

It’s time to log into your online bank, or alternate email, or one of the many hundreds of accounts we all have. What was your password again? Your mother’s maiden name and your birthday? Your first pet and your graduation year? Maybe you try to make it easy and use the same password…

Read More

Jan 3

Staying safe using public WiFi

Posted by Zac

Free wifi is pretty awesome. We count on it to keep our active lives moving and there are no shortages of wireless access points these days. But what do we risk for this ease of access? You might trust that barista with your latte, but can you trust them with your computer’s security?…

Read More