15 Apr 2020

Microsoft opens AccountGuard to healthcare providers on the COVID-19 front lines

Today, Microsoft makes its AccountGaurd anti-phishing protection services free for healthcare organizations who are working on the front lines of the current pandemic. The service was previously only provided to a very small number of admitted users. AccountGaurd includes features that protect email accounts against spear-phishing emails. Until now, the

Read More
15 Apr 2020

April Patch Tuesday: Microsoft Battles 4 Bugs Under Active Exploit

April’s Patch Tuesday consisted of 113 patches, which was most likely difficult for IT staff under WFH security concerns. This patch Tuesday includes 19 critical vulnerabilities and 94 that are classified as important. Four of the critical vulnerabilities are being exploited in the wild, however, two have previously been publicly

Read More
09 Apr 2020

Over 350,000 Exchange Servers Exposed to Serious RCE Bug

According to Rapid7, over 350,000 Exchange servers across the globe remain exposed to a critical vulnerability patched by Microsoft in February. The vulnerability is actively exploited in the wild, according to researchers, and over 82% of the 433,464 Exchange servers detected are still vulnerable as of March 24. The vulnerability,

Read More
09 Apr 2020

Zoom’s fall: Google bans Zoom from staffers’ gear

Last week, Google announced that it will block Zoom from all Google-provided devices, including computers and smartphones. Google stated that they have historically not allowed employees to use unapproved apps for work that are outside of Google’s corporate network. The company informed its employees that Zoom will no longer run

Read More
09 Apr 2020

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

New research from Cisco Talos has shown that 3D printed technology can bypass fingerprint scanners used in Apple, Samsung, and Microsoft products. 3D technology can create “fake fingerprints” that can bypass popular scanners, however, it remains costly and time-consuming to produce. Researchers tested the models on mobile phones including the

Read More
07 Apr 2020

U.S. High Performance Computing Takes On COVID-19

The US Federal government has assembled a group of high-performance computing (HPC) resources for the disposal of researchers who are tirelessly looking for potential cures and treatments for the COVID-19 virus, which has claimed thousands of lives across the globe. HPC may be critical to finding a cure, as it

Read More
27 Mar 2020

The Future of Enterprise Cloud Computing

Cloud Computing has been a key part of most interesting business strategies over the last decade. It has also been critical in bringing high end compute power to individuals around the world (Cloud services enable most highly recognizable services and apps, from Uber to Zoom and most everything in between). But what will come next? This special report offers a glimpse into the future of this trend meant to inform your business strategy.

Read More
11 Mar 2020

Microsoft March 2020 Patch Tuesday Fixes 115 Vulnerabilities

Today Microsoft released its monthly Patch Tuesday security update, publishing fixes for 115 vulnerabilities in Microsoft products. Of the 115, 24 of the vulnerabilities are classified as Critical while 88 are classified as Important. Experts advise users to install these security updates as soon as possible to mitigate possible security

Read More
10 Mar 2020

Spying concerns raised over Iran’s official COVID-19 detection app

Today, Google removed an Android app from the Play Store that was created by Iranian officials to test and keep track of coronavirus infections amid spying allegations. Several users accused the Iranian government of using the epidemic to scare and trick citizens into installing the app, subsequently collecting phone numbers

Read More
09 Mar 2020

Multiple nation-state groups are hacking Microsoft Exchange servers

A recent vulnerability in Microsoft Exchange email servers has been exposed by multiple different government-backed hacking groups. The hacking attempts were first spotted by the UK based cyber security firm Volexity, who has not yet shared names of the hacking groups exploiting the vulnerability, however, they have stated that the

Read More