29
Dec

Web Trackers Exploit Browser Login Managers

Posted by on · · · | News

Another day, another online hack, or so it seems. Whether it’s the Yahoo! password grab, or the Equifax data breach, we know that we need to secure our passwords online. Just when you thought you had done everything to be save online, we now learn of one more way your data is not safe. A […]

Read More
27
Dec

Critical Vulnerability Patched in Mozilla Thunderbird

Posted by on · · · | News

Via Ars Technica: Mozilla has recently released a major upgrade to the Thunderbird email client that addresses a critical buffer-overflow vulnerability that was discovered earlier this year: The bug, rated critical by the Mozilla Foundation, is CVE-2017-7845, which is a buffer overflow vulnerability affecting only Windows users. “A buffer overflow occurs when drawing and validating […]

Read More
03
Nov

Westlaw: Blockchain 101

Posted by on · · · · · | News

Thomson Reuters (aka: Westlaw) has a introductory primer up on the increased use of blockchain technologies in both the financial and legal sectors. Blockchain 101 [Note: The article is partially pay-walled, so to read the full piece you will need a Westlaw login.]

Read More
25
Oct

New Ransomware, Dubbed “Bad Rabbit”, Strikes Europe

Posted by on · · · · | News

Endgadget is reporting on a new malware attack underway in in Europe. Dubbed “Bad Rabbit”, the attack takes advantage of widely known flaws in Adobe’s Flash product to trick users into downloading a fake update from a compromised web site. Once installed, the update encrypts user files, rendering them inaccessible until a ransom demand of […]

Read More
05
Oct

Yahoo!’s 2013 Data Breach Was FAR Worse Than Reported

Posted by on · · · | News

Via Bloomberg: “Yahoo! Triples Likely Scope of 2013 Hack to 3 Billion Users” If you’ve ever had a Yahoo! account, the following sentence is not going to help your blood pressure: Yahoo, the internet company acquired by Verizon Communications Inc. this year, now believes a 2013 security breach exposed all 3 billion of its users […]

Read More
15
Sep

2017 Tech Forward Conference

Posted by on · · · · · | Blog

Join Tech Impact and the nonprofit community for a 3-day event to engage, learn and envision how technology can transform the way we work as nonprofits. Catered to nonprofit employees in varying roles looking to use technology in a more effective way, Tech Forward will provide a forum to encourage discussion on the need to […]

Read More
08
Sep

The Equifax Breach: What You Should Do

Posted by on · · · · | Blog

The Equifax data breach affects some 143 million people, or, once you [hopefully] factor out children and people with supposedly no credit history to track, roughly 44% of the total population of the United States. Should you be alarmed? Yes. Absolutely. But what practical steps can you take now to protect yourself, or minimize the […]

Read More
06
Sep

October is National Cyber Security Awareness Month

Posted by on · · | News

October is National Cyber Security Month, and this year the National Cyber Security Alliance have teamed up with the  folks from SANS to put together a Cyber Security Awareness Toolkit. The kit includes a planning matrix, email templates, posters, videos, and a host of activities designed to encourage and increase participation in the field of […]

Read More
18
Aug

The Cloud: A Primer

Posted by on · · · · | Blog

Introduction Unless you’ve been lost in the Outback for the last few years, you’ve probably heard someone make mention of “the cloud”. But you still may not know what exactly is meant by the phrases “all of my important documents are stored in the cloud” or “we back up to the cloud every night”. Essentially […]

Read More
14
Jul

Don’t Get Hooked by Smishers!

Posted by on · · | Blog

Most of you (I hope) are aware of the security risks involved with clicking on links in emails. Phishing is a common form of fraud in which a hacker tries to retrieve confidential information such as login credentials, personal identification, or even credit card information via email. Typically, a “phisher” will send an email that […]

Read More