Blog

New Windows Server 2022 Includes Security Improvements

Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there's a lot to like in terms of built-in protections. That is amazing, even if you're not especially concerned ...

New Ryuk Ransomware Function Spreads Across Networks Quickly

In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a ...

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed "AlumniLocker" and "Humble", both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of ...

People Using Mobile Data Instead Of Internet Service Providers

The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were ...

Mobile App Vulnerabilities Found To Leave Data Unsecured

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That's good in theory, but based on new research from Zimperium, a disappointing percentage ...

Want to improve your company culture? Try happiness

In his book "The Happiness Advantage," Shawn Achor explores the role of positive psychology in the workplace. Most of us operate with the assumption that success leads to increased happiness, but Achor’s research proves the opposite. Successful people at work don’t succeed ...

Microsoft Is Giving Windows 10 A New Makeover

One of the most frequently heard complaints about Windows has to do with aesthetics. Despite a few seemingly halfhearted attempts to modernize, significant portions of the OS looks and feels like they ...

Learn From Big Breaches: Focus on the Root Causes

Address these six technical root causes of breaches in order to keep your company safer. There have been dozens of mega-breaches in the past decade and over 9,000 reported breaches. Unsurprisingly, many breaches are unreported, as shown by credential dumps ...

Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose ...

Microsoft Expanding Fight Against Macros Based Malware

Macros have been a simple, effective means of spreading malware since the 1990's, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It's a long standing issue ...

Contact

Computer Troubleshooters - PittsburghComputer Troubleshooters - Pittsburgh Logo $$$

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • RSS