Night Eye is the Frank’s Red Hot of browser extensions; “I put that sh*t on every thing”.
Mimecast, a popular Email Security and Archival platform, posted on its blog Tuesday that a certificate it uses to encrypt traffic between itself and Microsoft was hijacked. Details are sketchy at this point, but the company is estimating approximately ten percent of its more than 36,000 customers use the corrupted connection. The suggested action is […]
Flash Player itself has a timebomb in it that will prevent it from working after 1/12/2020.
Every once in a while I find myself needing to review or edit code on my mobile. It never fails, I’ll be out with my family and the solution to some problem I have been struggling with will pop into my head seemingly from nowhere. The other common scenario I experience is somebody emailing me […]
SolarWinds is an Austin Texas based company that makes a lot of tools used by IT departments the world over. Their all-in-one monitoring suite known as Orion has been the victim of a supply chain attack. In what experts are calling a Nation State funded hack, updates to the software over the last several months […]
Have you every met a person who has invested in a four-wheel-drive vehicle and became a poor driver because of it? An acquaintance was taking me for a drive in his new SUV on a snowy day and was driving quite dangerously. “Don’t worry, it’s four-wheel drive”, he told me. I was thinking, “yeah, but […]
I’ve been a big fan of Samsung’s LED Wallet Case for years. I had them for my last three Samsung Galaxy Note phones. They hold a couple of cards and have an LED display on the front that displays various simple lighted icons for notifications, calls, texts, and music. The one thing the case doesn’t […]
With all of the ransomware attacks that are making the headlines this year, many businesses are looking to improve their security posture. One of the methods security professionals find most effective is to use software that controls what applications any networked computer is able to run. If an employee can’t open the bad actor’s malware […]
I was so excited when my Oculus Quest 2 arrived this afternoon. I booted it up, went through the setup and upgrade and prepared to play my first game. While I was waiting for the game to load I noticed a buzz or whining noise that my IT brain immediately identified as a fan. Sometimes […]
Back in the day, your network credentials were used to logon to your computer, get to your email server, and maybe to access some files or a printer. When you changed your password, if you changed it at all, it made sense to update it on the two or three systems that used it all […]