• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Blogs

IoT Security

Report: Vulnerability Allows Hackers to Spy Via IoT Devices

August 17, 2021 Zachary Comeau Leave a Comment

A newly discovered vulnerability that could affect 83 million IoT devices allows an attacker to listen to live audio, watch real-time video data, compromise device credentials for further attacks or remotely control devices, according to new research. According to Mandiant, a subsidiary of cybersecurity firm FireEye, the IoT vulnerability is in the ThroughTek Kalay network, […]

Read More

John Oliver Takes Up Ransomware On “Last Week Tonight”

August 16, 2021 Zachary Comeau Leave a Comment

System administrators, IT professionals and cybersecurity experts have been sounding the alarm over ransomware and the increasing frequency of attacks over the last few months, and their message is now beginning to be picked up by mainstream media. Ransomware is now rising to a national security level thanks to recent attacks against Colonial Pipeline, JBS […]

Read More

Microsoft warns of macros-based malware

How To Protect Against Macro-Based Malware

August 13, 2021 Alyssa Borelli Leave a Comment

Macro-based malware, an attack that once fell out of favor with hackers is possibly resurging, according to experts.

Read More

Elon Musk Cryptocurrency bitcoin scam

Top 3 Ransomware Operators by Income

August 13, 2021 Alyssa Borelli Leave a Comment

A new ransomware payment tracking site aims to make financial transactions to ransomware operators more transparent, see who’s on top.

Read More

Patch the Print Nightmare Vulnerabilities Now

August 13, 2021 Zachary Comeau Leave a Comment

Much has been made of the vulnerabilities recently discovered in the Windows Print Spooler Service and Microsoft’s patches for the issue. Now, systems that remain unpatched are being attacked by ransomware operators. In a new report, Cisco Talos says a threat actor is exploiting those vulnerabilities – dubbed PrintNightmare – to spread laterally across a […]

Read More

Cybersecurity testing, penetration testing, cyber threats

IT Departments Are Investing More In Cybersecurity Skills, Report Finds

August 12, 2021 Zachary Comeau Leave a Comment

IT teams across the globe faced unprecedented challenges in 2020 and 2021, and cybersecurity concerns are at – or near – the top of the list, leading to IT departments investing more in security, according to a new report from Sophos. The cybersecurity giant polled 5,400 IT managers across 30 countries and found that workloads […]

Read More

Senate passes infrastructure bill

Senate Passes Infrastructure Bill Allocating $1.9 billion For Cybersecurity

August 11, 2021 Alyssa Borelli Leave a Comment

The Senate has passed a bipartisan infrastructure bill allocating $1.9 billion towards securing critical infrastructure against attacks.

Read More

Microsoft Vulnerabilities

44 Vulnerabilities Addressed in Microsoft’s August Security Release

August 11, 2021 Zachary Comeau Leave a Comment

Microsoft’s August security patches include fixes for 44 vulnerabilities, including three zero days and one that is being actively exploited. The most important patches fix issues related to the Windows Print Spooler remote code execution vulnerability and the Windows LSA spoofing vulnerability and an actively exploited vulnerability in Windows Update Medic Service. Because of the […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

What DarkSides’ Rebranding Means for IT

August 10, 2021 Alyssa Borelli Leave a Comment

Cyber experts believe cyber criminal gang, DarkSide has rebranded causing what some call a giant “game of whack-a-mole.”

Read More

1Password Browser Extension

Stop Making Passwords Too Complex

August 10, 2021 Zachary Comeau Leave a Comment

If you’re still requiring users to create complex passwords with a combination of letters, numbers and symbols, think again, says the U.K.’s National Cyber Security Centre. The NCSC, the U.K. counterpart to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), maintains that complexity requirements and making users regularly change passwords is actually less secure than […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 151
  • Page 152
  • Page 153
  • Page 154
  • Page 155
  • Interim pages omitted …
  • Page 295
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.