Malware – Necurs botnet variant uses rare Excel IQY file extension

Uncategorized Comments Off on Malware – Necurs botnet variant uses rare Excel IQY file extension

One of the many rare “features” in Excel is the use of the “IQY” file extension.  This is a text based function used to do a simple web lookup (but this can be made dangerous, by interacting with a malicious website — which is now in use by a new variant of the Necurs botnet).  […]

FBI – Fake threats are serious federal crimes

Uncategorized Comments Off on FBI – Fake threats are serious federal crimes

The FBI encourages all users of social networks to “Think Before You Post” … A major new wave of Hoax threats have occurred recently.  These are serious federal crimes as 1st responders may be sent & there is even a risk of human injuries during these dangerous situations. https://www.fbi.gov/news/stories/hoax-threats-awareness-052318 In recent months, the FBI and […]

Windows 10 – Cumulative Update for MAY 2018

Uncategorized Comments Off on Windows 10 – Cumulative Update for MAY 2018

Microsoft has just released a new Windows 10 cumulative update to fix a few issues recently found for version 1709 as described below https://wccftech.com/microsoft-windows-10-cumulative-update/ It’s no longer a surprise when Microsoft sends multiple cumulative updates in a month. We may as well just stop referring to Patch Tuesday as one but the company does send […]

Leadership – PMBOK version six MAY 2018

Uncategorized Comments Off on Leadership – PMBOK version six MAY 2018

The following article from IIL shares the value of Project Management disciplines.  It highlights PMBOK (version 6) and other disciplines, that can effectively define tasks & resources leading to project successful completion. What is Project Management? Projects have been around for thousands of years. Ever see a picture of the Pyramids of Giza? That’s a […]

US CERT – Warning for 2 new SPECTRE variants in MAY 2018

Uncategorized Comments Off on US CERT – Warning for 2 new SPECTRE variants in MAY 2018

The US CERT has issued a vulnerability warning for new SPECTRE variants that are based more on hardware designs and the need for O/S processing to take new pathways to avoid side channel memory compromise issues https://www.us-cert.gov/ncas/alerts/TA18-141A TA18-141A: Side-Channel Vulnerability Variants 3a and 4 CPU hardware implementations— known as Spectre and Meltdown—are vulnerable to side-channel […]

Microsoft Azure – SQL ATP security product

Uncategorized Comments Off on Microsoft Azure – SQL ATP security product

Microsoft has announced SQL Advanced Threat Protection (ATP), which can provide improved protection for Azure SQL data base cloud users. https://redmondmag.com/articles/2018/05/18/sql-advanced-threat-protection-ga.aspx Microsoft this week announced SQL Advanced Threat Protection (ATP), which is described as “a new security package” for Azure SQL Database users. SQL ATP is kind of like another brand in Microsoft’s sprawling ATP product line, […]

Acer – First Laptop to offer built in Alexa digital assistant

Uncategorized Comments Off on Acer – First Laptop to offer built in Alexa digital assistant

HP recently introduced an all-in-one desktop featuring Alexa built in. Also, Acer has become first manufacturer to offer this built-in facility in a laptop.  https://www.engadget.com/2018/05/21/acer-laptops-with-alexa-built-in/ HP may have been the first to offer an all-in-one with Alexa built-in, but Acer is determined to do the same for the laptop realm. It just revealed that several […]

Leadership – 10 guidelines to improve employee performance issues

Uncategorized Comments Off on Leadership – 10 guidelines to improve employee performance issues

The John Maxwell leadership training center shares valuable & caring techniques to help guide employees for improved performance. These should be privately and in a positive manner the leader would want to treated when receiving this type of advice (aka, the Golden Rule) http://johnmaxwellcompany.com/blog/ten-guidelines-for-confrontation I bet you’ve heard this before: In any organization, people are […]

Data Breach – TeenSafe phone monitoring app compromised

Uncategorized Comments Off on Data Breach – TeenSafe phone monitoring app compromised

TeenSafe is a phone monitoring application that can enhance parental controls.   However, 000s of teenagers may be impacted by a rare & accidental leak of Apple ID email addresses and plaintext passwords as described below. https://www.zdnet.com/article/teen-phone-monitoring-app-leaks-thousands-of-users-data/ At least one server used by an app for parents to monitor their teenagers’ phone activity has leaked tens of thousands of […]

Apple – Best practices for corporate support in 2018

Uncategorized Comments Off on Apple – Best practices for corporate support in 2018

This list by JAMF shares some of best practices for Apple device management from a corporate perspective. https://www.jamf.com/blog/best-practices-for-apple-device-management/ IT best practices ensure that processes and workflows executed by IT resources are sound and proven, promoting cost-effective delivery of IT services. They come from the experience of others in the past that have attempted to achieve […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in