USB juice jacking

FBI and FCC Cautions On Juice Jacking

The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) are warning the public about the dangers of “juice jacking.” Juice jacking occurs when someone innocently plugs their phone or mobile device into a compromised USB port that is infected with malicious software. Such malware can allow criminals …

Windows 7 End of Life

Windows 7 Support Officially Ends Today

Windows 7 End of Life has arrived. Microsoft is ending support for this aging operating system on January 14, 2020. This means a decade after introducing Windows 7, Microsoft will no longer provide security updates or patches unless you purchase Extended Security Updates from Microsoft. Tech support from Microsoft for …

Win 7 End of Life

Windows 7 And Our Clients

A decade after introducing Windows 7, Microsoft is ending support for this aging operating system on January 14, 2020. As our client, we are conducting a thorough audit of your resources to determine how the end of Windows 7 will impact your network. Once an operating system enters end-of-life status, Microsoft …

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come …

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life. This email appears …

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident …