Office 365 Update to Help Protect from Macro Based Malware
We are now in an era where it’s hard not to make use of new technologies such as Cloud Storage. With your data available anywhere you are through the connection of the internet, this has helped many businesses become more flexible in their operations. However, we are always skeptical on how safe our data is […]
Cisco Announces new small Business WiFi Solution, Meraki Go
Cisco, a global leader in networking solutions, has announced the launch of its latest innovation, Meraki Go, a small business WiFi solution. Meraki Go is designed to simplify the network for small businesses by offering an easy-to-use and cost-effective solution that promises to take their network to the next level. This innovative solution is set […]
Exploit “Faxploit” affects HP OfficeJet All-in-One Printers
Security researchers have recently demonstrated at the security conference DEF CON 2018 a vulnerability that can be exploited via HP OfficeJet All-in-One Printers. It is being dubbed “Faxploit” by the researchers, Eyal Itkin and Yaniv Balmas. The attack takes advantage of security flaws in the implementation of the fax protocol used by OfficeJet printers, making […]
Protect Your Critical Data with Known Folder Move!
Data is usually rank #1 when asked of users in importance of their endpoints. So, it is always somewhat strange that when asked if they keep a back up of their files, the answer is usually no. Data is usually taken for granted by end-users, sometimes event saving them in improper places such as their […]
Simplify your Business Networks with Citrix SD-WAN!
You may have heard by now of the new technology that’s been getting a lot of buzz over the past years, software-defined WAN or SD-WAN. This exciting technology enables organizations to reduce network complexity and cost while improving flexibility, security, availability, and visibility. Citrix has made use of this technology and improved on the concept […]
New Vulnerability aLTEr Discovered by Researchers
Researchers from Ruhr-Universität Bochum & New York University Abu Dhabi have recently discovered three types of attacks/vulnerabilities for devices using Long-Term Evolution (LTE) network protocol that cyber criminals can use to steal your data. The researched team has dubbed the attacks as “aLTEr”. With LTE (a form of 4G) as a standard in the mobile […]