A new threat, dubbed Sandworm by iSight Partners, has been discovered. It is a cyber espionage campaign dating back to at least 2009, and is said to be based in Russia. Sandworm uses a previously undiscovered zero-day vulnerability in Windows operating systems to steal information from government leaders and organizations.
Macro Systems Blog
Microsoft Outlook is a great tool for the everyday businessman, but it can be tricky to use sometimes. Just like Microsoft Word, there are several shortcuts that you can utilize to boost your productivity and reduce the amount of time you spend fumbling around the variety of different options available to you.
When it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.
Apple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?
Virtualization is all the rage in the technology world. In fact, virtual servers are practically omnipresent in modern workplaces. Why? Because they offer businesses unprecedented opportunity for growth and development. The benefits of virtualized servers far outweigh the costs, aiding businesses in expanding their goals and visions for the future.
Herding cats is a business term used to describe the task of organizing and controlling entities like people and systems known for being uncontrollable and even chaotic. Due to the unpredictable and independent nature of felines, cat herding captures the idea of controlled chaos perfectly. Does running your business feel like you're working on a cat ranch?
If your business has a reliable and high-speed Internet connection, then you’ve got what it takes to experience significant savings by switching your company’s phone system to VoIP (Voice over Internet Protocol). Once you’ve decided to make the switch, you will next have to select a VoIP solution that’s right for your organization. Here are some tips to help you make this important decision.
For the past 12 years, the Harkonnen Operation has plagued Europe. The malware campaign, operating scams in Germany, Switzerland, and Austria since 2002, has finally ended, but that doesn't change the fact that it may be the most long-lived malware to have existed. What kept security firms from discovering these attacks and preventing them for so long?
Are you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.
It's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.
A lot of employers are nervous about letting their employees work from home, but due to the increased evidence that it can be beneficial to productivity and cost-efficiency, it's getting more and more difficult to avoid thinking about it. In fact, according to Global Workplace Analytics, working from home has grown a whopping 80 percent in the United States since 2005.
Well, now that we've got your attention, it's a good time to mention that leaked photos and a video of what may be Windows 9, currently called Threshold, have been leaked to the web. As the next entry in the Windows family of operating systems, it has been highly anticipated since the return of a Start menu was displayed in April 2014. Microsoft has a lot of ground to cover after Windows 8, but will Windows 9/Threshold deliver?
Hackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.
The Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.
Bring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.
Taking notes is a pain, and we all know that. One of the biggest problems with taking notes is that your team might store them all in different places. Before you know it, you have no idea where anything is or what has been done. Microsoft's OneNote on OneDrive changes that, providing a collaborative cloud-based solution for note taking.
When diagnosing your computer's security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved that malware can be located not only on your computer and devices, but even on your wireless router.
Across the country kids are hopping on buses and heading back to school. Schools sure have changed and classes aren't quite the same as they used to be. Perhaps the most important thing about these changes has been the classes available for the kids. In fact, some schools have started teaching children how to code, and France is next on the list.