by petratechit | Feb 12, 2022 | Uncategorized
If you have Google Drive, there’s good news. The company has recently announced that soon they’ll be rolling out a new feature to help alert users to the presence of suspicious documents. Google Drive users will soon start seeing banners alerting them to...
by petratechit | Feb 11, 2022 | Cybersecurity, Managed IT, Videos
If you aren’t concerned about the latest malware variants… you should be. With record-breaking increases of never-before-seen malware variants being detected every month, it’s more important than ever to be aware of the cybersecurity risks your...
by petratechit | Feb 10, 2022 | Uncategorized
Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google’s nose for nearly two years. The scam has now been shut down by Google but while it was...
by petratechit | Feb 9, 2022 | Uncategorized
There’s good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited by hackers to cause no end of trouble to anybody running macOS or...
by petratechit | Feb 8, 2022 | Uncategorized
One of the most persistently frustrating aspects of our highly interconnected world is that we seem to exist in at least three different distinct ecosystems. Apple users live in the Apple ecosystem which encompasses both its mobile products and its PCs. Windows users...
by petratechit | Feb 7, 2022 | Uncategorized
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template that does an admirable job of imitating the look and feel of emails sent from the US...
by petratechit | Feb 5, 2022 | Uncategorized
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any device suffering from the vulnerability...
by petratechit | Feb 4, 2022 | Cybersecurity, Tips and Tricks, Videos
Although it’s a little early to be spring cleaning, it is generally a good idea to “clean up” the unused programs and applications in your digital home, such as a computer or a work phone. Every program or application installed is one more avenue for...
by petratechit | Feb 4, 2022 | Uncategorized
The WP HTML Mail plugin has been installed on more than 20,000 websites. If you’ve built a WordPress site for your business and you use that plugin, be aware that you are at risk. A high severity security flaw was recently discovered in the plugin that could...
by petratechit | Feb 3, 2022 | Uncategorized
When Apple first released iOS 15 they posted a promise on their website. That promise was: “If you’re using iOS or iPadOS 14.5 or later, you might now see the option to choose between two software update versions. This option allows you to choose between...