Latest Blog

Intelligent Communications takes the next step with calling in Teams

In September, we introduced a new vision for intelligent communications including plans to evolve Microsoft Teams into the primary client for calling and meetings in Office 365. As part of this, we are bringing comprehensive calling and meetings capabilities into Microsoft Teams, along with data and insights from the Microsoft Graph, and a strong roadmap

Read More

HP says nearly 500 laptop models have a dangerous bug that can record everything you type

A security researcher discovered a vulnerability in a common piece of software that comes installed on several laptop brands and models. This bug is in the Synaptics software that controls keyboard and trackpad inputs on 460 HP laptop models, including versions of the Pavilion, the EliteBook, and the ProBook. Read More

Read More

Phishers Are Upping Their Game. So Should You.

Not long ago, phishing attacks were fairly easy for the average Internet user to spot: Full of grammatical and spelling errors, and linking to phony bank or email logins at unencrypted (http:// vs. https://) Web pages. Increasingly, however, phishers are upping their game, polishing their copy and hosting scam pages over https:// connections — complete

Read More

Mecklenburg government paralyzed as hacked computer files are held for ransom

Mecklenburg County government has been paralyzed by an unknown computer hacker after a county employee unknowingly opened an email attachment Monday that unleashed spyware and a worm into the county’s computer system. Read More With the recent #ransomware attack on @MeckCounty government, now is the time to build your defense. Are you prepared? Our #cybersecurity

Read More

Should Your Business Set up Shop in Bill Gates’s Smart City?

You’ve probably heard that Microsoft founder — and well-known 1-percenter — Bill Gates plans to build a futuristic “smart city” in Arizona. More precisely, one of the billionaire’s investment companies, Cascade Investment, invested $80 million in a high-tech development planned in the Arizona desert. Read More

Read More

CVS to Buy Aetna for $69 Billion in a Deal That May Reshape the Health Industry

CVS Health said on Sunday that it had agreed to buy Aetna for about $69 billion in a deal that would combine the drugstore giant with one of the biggest health insurers in the United States and has the potential to reshape the nation’s health care industry. Read More

Read More

December 2nd is making some iPhones soft reset (update)

Apple software had a rough November, and December isn’t off to a good start as there’s an apparent date bug causing problems for iPhone owners running the latest versions of iOS (11.1.1 or 11.1.2). Read More

Read More

The big stores that track your every online move

A study by Princeton researchers came to light earlier this month, revealing that over 400 of the world’s most popular websites use the equivalent of hacking tools to spy on you without your knowledge or consent. Read More

Read More

Uber’s massive hack: What we know

Uber’s disclosure that hackers accessed the personal information of 57 million riders and drivers last year, a breach it didn’t disclose publicly until Tuesday, adds new potential legal woes for the already troubled company. Read More

Read More

Uber Paid Hackers to Delete Stolen Data on 57 Million People

Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000

Read More

Warning: Your Child May Be Able To Unlock Your iPhone Simply By Looking At It

Your child may be able to unlock your new iPhone X simply by looking at it.  Seriously.  If you use Apple’s Face ID technology – which unlocks iPhones by recognizing the user looking at the device – you may be at risk of having your child, parent, or other close family member being able to

Read More

The best smartphones you can buy right now

Smartphones get better every year, but 2017 has seen a string of particularly impressive devices. The benefits are obvious — there’s never been a better year to be in the market for a new phone — but that also means that making a decision is harder than ever. Since we’ve tested all of 2017’s major

Read More

Bringing AI to job seekers with Resume Assistant in Word, powered by LinkedIn

Today, at LinkedIn’s headquarters in San Francisco, we announced Resume Assistant, a new feature in Microsoft Word to help Office 365 subscribers craft compelling resumes with personalized insights powered by LinkedIn. With over 80 percent of resumes updated in Word, Resume Assistant helps job seekers showcase accomplishments, be more easily discovered by recruiters, and find

Read More

How Level 3’s Tiny Error Shut Off the Internet for Parts of the US

A YEAR AGO, a DDoS attack caused internet outages around the US by targeting the internet-infrastructure company Dyn, which provides Domain Name System services to look up web servers.  Read More

Read More

Google Docs ‘terms of service violation’ affecting users

Imagine you’re working on a Google Doc when, seemingly out of nowhere, your ability to edit the online file gets revoked. What you see instead is an error message indicating that you’ve violated Google’s terms of service. Read More

Read More

Dell Lost Control of Key Customer Support Domain for a Month in 2017

A Web site set up by PC maker Dell Inc. to help customers recover from malicious software and other computer maladies may have been hijacked for a few weeks this summer by people who specialize in deploying said malware, KrebsOnSecurity has learned. Read More

Read More

GDPR and Reputation Loss Bother Businesses

Businesses are not seeing the requirements of GDPR as serious, and continue to be confused by what is required. According to the survey of 1,350 business decision makers, the Risk:Value report from NTT Security found that 39% of European respondents identified GDPR as a business risk, while 33% identified ISO 27001/2 as a compliance regulation

Read More

Reaper: Calm Before the IoT Security Storm?

Its been just over a year since the world witnessed some of the world’s top online Web sites being taken down for much of the day by “Mirai,” a zombie malware strain that enslaved “Internet of Things” (IoT) devices such as wireless routers, security cameras and digital video recorders for use in large-scale online attacks.

Read More

U.S. warns public about attacks on energy, industrial firms

The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an increasing threat to the power industry and other public infrastructure. Read More

Read More

Microsoft has already fixed the Wi-Fi attack vulnerability

Technology companies are starting to respond to a new Wi-Fi exploit affecting all modern Wi-Fi networks using WPA or WPA 2 encryption. The security vulnerabilities allow attackers to read Wi-Fi traffic between devices and wireless access points, and in some cases even modify it to inject malware into websites. Read More

Read More

Why is interest in new smartphones falling?

There’s no doubt about it: comparing the year-on-year data, interest in new smartphone launches is falling, and falling dramatically.  It hasn’t just been over the last few launches, either – this downswing has been happening for years. Read More

Read More

Equifax Credit Assistance Site Served Spyware

Big-three consumer credit bureau Equifax says it has removed third-party code from its credit report assistance Web site that prompted visitors to download spyware disguised as an update for Adobe’s Flash Player software Read More

Read More

System Shock: How A Cloud Leak Exposed Accenture’s Business

The UpGuard Cyber Risk Team can now reveal that Accenture, one of the world’s largest corporate consulting and management firms, left at least four cloud-based storage servers unsecured and publicly downloadable, exposing secret API data, authentication credentials, certificates, decryption keys, customer information, and more data that could have been used to attack both Accenture and

Read More

Google is tryharding at phones right now, and I love it

I’ve been an iPhone user since the day the first model came out in 2007. I’ve used a bunch of Android devices for work, and even bought a couple for my personal use over the years, but I always come back to iOS’s welcoming arms. But something about Google’s hardware event this week really spoke

Read More

Flying taxi in skies by 2018 says Airbus

Airbus has said it remains on track to carry out the maiden flight of a “flying taxi” by the end of next year. The aerospace giant confirmed the first flight target after its helicopter division successfully completed a full-scale ground test of a propulsion system for the “CityAirbus.” Read More

Read More

Former Equifax CEO blames breach on one IT employee

The Equifax data breach that leaked information on the now-145 million people was caused by a vulnerability in Apache’s Struts system. Trouble is, the software provider supplied a patch back in March that should have eliminated that vulnerability.  Read More

Read More

Apple computers are at risk from flawed updates, researchers find

Maybe it isn’t sexy, but it stops hackers from using well-known bugs to break into your computer. In fact, it’s the most important thing you can do to keep your computer safe. Say it with me: Update your software. Read More

Read More

SSNs are now useless for anything but Social Security

The Equifax hack that compromised 143 million Social Security numbers didn’t just destroy the country’s trust in credit bureaus; it also most certainly killed the use of SSNs for security and identity authentication. Read More

Read More

A Shift in the ATM Malware Landscape: From Physical to Network-based Attacks – Security News – Trend Micro USA

There is no way around it: Compromising automated teller machines (ATMs) could be seen by criminals as hitting the mother lode. Oftentimes there would be reports of unauthorized cash-outs, and upon investigation, skimmers and other attacks by physical means would be the usual suspects. Read More

Read More

Dubai starts tests in bid to become first city with flying taxis

Dubai staged a test flight on Monday for what it said would soon be the world’s first drone taxi service under an ambitious plan by the United Arab Emirates city to lead the Arab world in innovation. The flying taxi developed by German drone firm Volocopter resembles a small, two-seater helicopter cabin topped by a

Read More

Microsoft is going all in on Teams and plans to phase out Skype for Business

Microsoft Teams, the company’s Slack competitor with deep integrations into the Office 365 apps, has seen a lot of pickup over the last few months, with over 125,000 organizations now using it in one form or another. Maybe it’s no surprise, then, that the company today announced it is going all in on Teams as

Read More

Goodbye, login. Hello, heart scan.

Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.  The system uses low-level Doppler radar to measure your heart, and then continually monitors your heart to make sure no one else has stepped in to run your computer.

Read More

Equifax has been directing victims to a fake phishing site for weeks

In failing to correctly patch a known vulnerability and exposing the personal data of potentially 143 million Americans to hackers, Equifax made a security blunder of epic proportions — however, it appears the company is just getting started. Read More

Read More

This is why an online search for Avril Lavigne is dangerous

If you ever find yourself searching online for Avril Lavigne, use extra caution.  The singer is considered the most dangerous celebrity to search online, said security firm McAfee on Tuesday.  Read More

Read More

This is why you shouldn’t use texts for two-factor authentication – The Verge

For a long time, security experts have warned that text messages are vulnerable to hijacking — and this morning, they showed what it looks like in practice. A demonstration video posted by Positive Technologies (and first reported by Forbes) shows how easy it is to hack into a bitcoin wallet by intercepting text messages in

Read More

Hackers compromised free CCleaner software, Avast’s Piriform says

Hackers broke into British company Piriform Ltd’s free software that optimizes computer performance last month, potentially allowing them to control the devices of millions of users, the company and independent researchers said on Monday. Read More

Read More

Equifax Hack: The Real Estate Industry Is Just As Vulnerable

As smart cities begin to expand, it is becoming essential that real estate developers and investors keep cybersecurity top of mind. Smart buildings can improve building and tenant efficiency, but can also leave company and tenant information vulnerable to attacks. Read More

Read More

The IoT Attack Vector “BlueBorne” Exposes Almost Every Connected Device

Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth. Read More

Read More

As Amazon Pushes Forward With Robots, Workers Find New Roles

Nissa Scott started working at the cavernous Amazon warehouse in southern New Jersey late last year, stacking plastic bins the size of small ottomans. It was not, she says, the most stimulating activity. And lifting the bins, which often weigh 25 pounds each, was also tiring over 10-hour shifts. Read More

Read More

Great Ways to Watch NFL Games Almost Anywhere

There are more options than ever for watching National Football League games, whether they’re the traditional Sunday-afternoon matches on CBS and Fox, Sunday Night Football on NBC, Monday Night Football on ESPN, or Thursday Night Football on CBS, NBC, and the NFL Network. And let’s not forget the Thanksgiving Day games, Saturday games scheduled for

Read More

Equifax Announces Cybersecurity Incident Involving Consumer Information

Equifax Inc. (NYSE: EFX) today announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. Criminals exploited a U.S. website application vulnerability to gain access to certain files. Based on the company’s investigation, the unauthorized access occurred from mid-May through July 2017. Read More

Read More

Boston Red Sox Used Apple Watches to Steal Signs Against Yankees

For decades, spying on another team has been as much a part of baseball’s gamesmanship as brushback pitches and hard slides. The Boston Red Sox have apparently added a modern — and illicit — twist: They used an Apple Watch to gain an advantage against the Yankees and other teams Read More

Read More

You’re In Sales Too (Whether You Like It or Not)

I bravely walked in through the front door right past their no soliciting sign and up to the front desk. It was a cold call. I felt so cool standing there with my Blackberry 8700 in hand (later versions even had a color screen!). Read More

Read More

Office 365: A Vehicle for Internal Phishing Attacks

A new threat uses internal accounts to spread phishing attacks, making fraudulent emails even harder to detect. Cybercriminals go where the users are. Office 365, which has more than 100 million active monthly subscribers, has become a hotspot for compelling and personalized cyberattacks. Users trust emails from coworkers, especially those with the correct corporate email

Read More

MIT researchers use drone fleets to track warehouse inventory

Imagine a warehouse buzzing with tiny drones that automatically track and monitor inventory from afar, leaving workers free to manage and move material. That’s the new system developed by MIT researchers, which could prevent mismatches and help employees find particular items faster on top of looking really cool with a bunch of worker drones zipping

Read More

Is Your Mobile Carrier Your Weakest Link?

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security of your mobile account.

Read More

3 Ways Your Business Unknowingly Kills Worker Happiness And Productivity

Surfing the web, social media, water cooler chats. These are just some of the usual culprits that distract workers from being productive. While that may be true, there’s also something else at play – something that the employers themselves are responsible for. Read More

Read More

The 3 Most Common Misconceptions About Cyber Defense — ‘Culture, Complexity, Commitment’

Traditionally, tacticians in war have said, “The best defense is a good offense.” However, that statement couldn’t be farther from the truth when it comes to creating a cyberwar defense strategy. Read More

Read More

Google is trying again to push Chromebooks into big businesses, the core market for Microsoft Windows

Google’s Chromebooks have made inroads in the education market, so much that Microsoft has built its own Windows laptop to compete with them.  Now Google looks keen to take share in Microsoft’s real stronghold: big companies. Read More

Read More

Google and Walmart are partnering on voice shopping in a challenge to Amazon’s Alexa

Alexa, how do you spell “competition”?  Google and Walmart have entered into a partnership to make hundreds of thousands of Walmart products available to purchase through the Google Home voice-controlled speaker, the tech giant’s answer to the Amazon Echo, the companies told Recode on Tuesday. Read More

Read More

Donors at risk as Government warns charities are vulnerable to cyber attacks

Donors’ data could be at risk because many charities are not investing in adequate levels of cyber protection, the Government has warned. Read More

Read More

One mistake people make using public Wi-Fi

If I’ve said it once, I’ve said it a thousand times: Avoid doing anything you would not want anyone in the world to know on public Wi-Fi. You may think you’re safe in that busy café or big-name hotel, but public Wi-Fi is a major liability. Read More

Read More

Your timely reminder: Not all hacking requires a computer

The public perception of hacking involves a shadowy figure in a hoodie hunched over a laptop, tapping furiously while a waterfall of glowing green text fills the screen. Also he’s probably listening to industrial music. First off, that’s a ridiculous caricature, and more important, not all intrusions are the result of someone banging away on

Read More

Smart locks rendered dumb by automatic update fail

Making dumb things smart can have its benefits, but adding complexity to once-simple devices can also lead to unforeseen problems. It’s a lesson smart lock maker LockState is all too aware of, after a clumsily delivered automatic update bricked hundreds of the gizmos, rendering their fancier features like remote locking and unlocking unusable. Read More

Read More

Smart cameras spot when hospital staff don’t wash their hands 

If you end up in a hospital in Europe, you have a one in 20 chance of acquiring an infection while there. One of the leading causes is a lack of hand hygiene. Even though hospitals are filled with alcohol-based gel dispensers and advisory posters, they’re not working. Read More

Read More

Microsoft Surface Laptops, Tablets Not Recommended by Consumer Reports

Consumer Reports is removing its “recommended” designation from four Microsoft laptops and cannot recommend any other Microsoft laptops or tablets because of poor predicted reliability in comparison with most other brands. Read More

Read More

You will get chipped — eventually

LOS ANGELES — You will get chipped. It’s just a matter of time.  In the aftermath of a Wisconsin firm embedding microchips in employees last week to ditch company badges and corporate logons, the Internet has entered into full-throated debate. Read More

Read More

Take down: Hackers looking to shut down factories for pay

DURHAM, N.C. — The malware entered the North Carolina transmission plant’s computer network via email last August, just as the criminals wanted, spreading like a virus and threatening to lock up the production line until the company paid a ransom. Read More

Read More

Insurers increasingly use apps and drones instead of agents

Hobbyists aren’t the only ones using the phone and drone cameras to explore the world in new ways, as insurance companies are increasingly opting for “virtual” or “touchless” handling of claims. Read More

Read More

Need a new password? Here are 306 million to avoid

If you’re in the market for new, unique password, Troy Hunt has a trove of what you don’t want. Hunt, the security expert behind the Have I Been Pwned website, on Thursday released a searchable tool that contains 306 million previously compromised passwords. The tool’s database of passwords, collected from dozens of data breaches, aims to help

Read More

How Small-Business Owners Should Be Using IoT

By 2020, there will be more than 24 billion connected devices. This wave of connections is already impacting the way we live and work. Of course, for small-business owners, life and work are usually intertwined: Running a business is a 24/7 job. Read More  

Read More

Where can you find free prospect lists?

Your sales team may be asking for more prospects to contact and introduce your company’s products.  There are many options for you to pay and subscribe to lead services such as Hoovers, Dunn & Bradstreet, Salesgenie and more.  However, you may want to check your local library for a free resource. For instance, our local

Read More

What is the Best Productivity Tool you are not using?

The Best Productivity Tool you are not using is Dashlane…and it’s FREE Dashlane claims you can save 50 hours a year by using their autofill tool.  Autofill is just one of the many productivity features baked in their “password manager” saving you precious time.  After using their service for over a year, there’s no turning

Read More

What’s the best tool to manage all of your contacts?

With all of our family, friends, and business contact information fragmented across Facebook, LinkedIn, Work, Gmail, Outlook, Yahoo, and iCloud accounts, it can be a headache trying to find the correct email or phone number when needed.  With these options available to sync your contacts across your accounts (and across your mobile or desktop device),

Read More

Top 5 Extensions to make your Google Chrome Browser experience better

Why download a browser extension?  An extension can save and remember passwords, save a web page, correct your grammar, translate languages on web pages, automatically save you money when purchasing online, and much much more. The most popular browsers (Google Chrome, Internet Explorer, Mozilla Firefox) offer a plugin (similar to an app) to increase their

Read More

How to make your LinkedIn connections more useful

How many LinkedIn connections do you have?  100? 250? 500+?  Chances are your network is growing weekly.  Keeping track of your LinkedIn connections contact information is painful. Unfortunately, LinkedIn does not offer a 2-way sync to contact managers such as Google Contacts or Microsoft Outlook.  This means more data entry for you.  One solution is

Read More

How to keep all of your Notes and Lists Organized

Meeting Notes, Shopping lists, Articles, Business Cards, Snail Mail, Important Documents, To-Do Lists, Email, Attachments and Checklists.  A few years ago, a friend recommended an app for digital organization of all this stuff, Evernote.  Today, Evernote continues to be a powerful productivity tool capturing all of the above and more. Evernote can be downloaded and

Read More

How to keep track of your business expenses when your company doesn’t provide a tool

Whether you are in sales or a business owner, one of the most frustrating aspects of reporting is keeping track of business expenses.  After all, you are primarily focused on generating revenue.  If you work for a large company, many organizations have invested in software like Concur and Expensify to help alleviate the pain of

Read More

How to schedule time with busy people

People are busy.  Trying to find a time for two people to meet is difficult.  Add 3, 4, or more and it’s close to impossible.  Doodle helps solve this problem. 1.  Go to Doodle 2.  Sign up for a free account -for basic users.  (This account type should be enough to get you started). 3.

Read More

Subscribe to my Blog