Did you miss out on the May Lunch and Learn session about malicious software, presented by our very own Software Solutions Team? Don't despair, we've posted the slideshow and glossary of terms so you can catch up on the latest trends in malware, viri, trojans, rootkits, vulnerabilities, and more.
Microsoft recently announced a vulnerability affecting nearly all versions of Internet Explorer (IE). The vulnerability permits plugins such as Flash to unexpectedly run commands on your local machine when it visits a malicious site. This kind of vulnerability could lead to the takeover of affected computer systems.
This is a security bulletin regarding a recently disclosed OpenSSL vulnerability that allows disclosure of private encryption keys on servers running OpenSSL v1.
Moving part or all of your business to the cloud can be a daunting, often confusing endeavor.
Shortly before 9 pm on Friday Internet users all across the country noticed something was off with their favorite websites, they were no longer there.
This question has many answers in today’s world. It can be a lock and key, or a wall, or a weapon. It can be the blinds on your windows. It can be a cup of coffee, and a bowl of comfort food.
According to a 2007 Google study on the failure trends of hard disks, “over 90% of all new information produced in the world is being stored on magnetic media, most of it on hard disk drives” (Fail
I’m sure there are still those of us who remember having to get up off the couch, walk across the room, and turn the dial on the black and white TV to the next station then have to adjust the anten