• 0

Intelligent Communications takes the next step with calling in Teams

Category : Automation

In September, we introduced a new vision for intelligent communications including plans to evolve Microsoft Teams into the primary client for calling and meetings in Office 365. As part of this, we are bringing comprehensive calling and meetings capabilities into Microsoft Teams, along with data and insights from the Microsoft Graph, and a strong roadmap of innovation to empower teams to achieve more.
Read More


  • 0

HP says nearly 500 laptop models have a dangerous bug that can record everything you type

Category : Cybersecurity

A security researcher discovered a vulnerability in a common piece of software that comes installed on several laptop brands and models.

This bug is in the Synaptics software that controls keyboard and trackpad inputs on 460 HP laptop models, including versions of the Pavilion, the EliteBook, and the ProBook.

Read More


  • 0

Phishers Are Upping Their Game. So Should You.

Category : Cybersecurity

Not long ago, phishing attacks were fairly easy for the average Internet user to spot: Full of grammatical and spelling errors, and linking to phony bank or email logins at unencrypted (http:// vs. https://) Web pages. Increasingly, however, phishers are upping their game, polishing their copy and hosting scam pages over https:// connections — complete with the green lock icon in the browser address bar to make the fake sites appear more legitimate.

Read More


  • 0

Mecklenburg government paralyzed as hacked computer files are held for ransom

Category : Cybersecurity

Mecklenburg County government has been paralyzed by an unknown computer hacker after a county employee unknowingly opened an email attachment Monday that unleashed spyware and a worm into the county’s computer system.

Read More

With the recent #ransomware attack on @MeckCounty government, now is the time to build your defense. Are you prepared? Our #cybersecurity checklist will help you develop a layered defense to minimize your risk of a cyberattack.

Read More


  • 0

Should Your Business Set up Shop in Bill Gates’s Smart City?

Category : Automation

You’ve probably heard that Microsoft founder — and well-known 1-percenter — Bill Gates plans to build a futuristic “smart city” in Arizona. More precisely, one of the billionaire’s investment companies, Cascade Investment, invested $80 million in a high-tech development planned in the Arizona desert.
Read More


  • 0

CVS to Buy Aetna for $69 Billion in a Deal That May Reshape the Health Industry

Category : Automation

CVS Health said on Sunday that it had agreed to buy Aetna for about $69 billion in a deal that would combine the drugstore giant with one of the biggest health insurers in the United States and has the potential to reshape the nation’s health care industry.
Read More


  • 0

December 2nd is making some iPhones soft reset (update)

Category : Automation

Apple software had a rough November, and December isn’t off to a good start as there’s an apparent date bug causing problems for iPhone owners running the latest versions of iOS (11.1.1 or 11.1.2).

Read More


  • 0

The big stores that track your every online move

Category : Cybersecurity

A study by Princeton researchers came to light earlier this month, revealing that over 400 of the world’s most popular websites use the equivalent of hacking tools to spy on you without your knowledge or consent.

Read More


  • 0

Uber’s massive hack: What we know

Category : Cybersecurity

Uber’s disclosure that hackers accessed the personal information of 57 million riders and drivers last year, a breach it didn’t disclose publicly until Tuesday, adds new potential legal woes for the already troubled company.
Read More


  • 0

Uber Paid Hackers to Delete Stolen Data on 57 Million People

Category : Cybersecurity

Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers.
Read More


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.