©2016 BY TIC BUSINESS CONSULTANTS

(617) 884-1086

PO Box 3279, 360 N. Main St.,  Andover, MA 01810 

  • facebook
Please reload

Archive

Please reload

Tags

I'm busy working on my blog posts. Watch this space!

Please reload

Recent Posts

January 29, 2018

Update 01/22/2018:

Intel has communicated new guidance regarding the "reboot issues" with the microcode included in the BIOS updates released to address Spectre (Variant 2), CVE-2017-5715. Dell is advising that all customers should not deploy the BIOS update for the Spe...

January 13, 2018

When you turn on site isolation, Chrome offers more security protections for your browser.

Chrome will load each website in its own process. So, even if a site bypasses the same-origin policy, the extra security will help stop the site from stealing your data from anoth...

January 4, 2018

A critical security flaw in intel products has been discovered.  All computers should run the detection tool to see if they need to be patched.  An attacker could gain unauthorized access.

This includes scenarios where a successful attacker could:

  • Load and execute ar...

December 8, 2017

As the holiday season begins, many people will travel with their mobile devices. Although smart phones, tablets, and laptops offer a range of conveniences, users should be mindful of potential threats and vulnerabilities while traveling with them. Click here to see som...

November 8, 2017

Search poisoning, is an attack method in which cybercriminals create malicious websites and use search engine optimization tactics to make them show up prominently in search results.  Be careful when searching for any financial or banking sites.  Never give personal in...

November 1, 2017

Have you had a pop up appear on your screen that informs you your Adobe Flash, Java, or some other third party app needs an update?  Sometimes these updates are malicious code.  When you get a pop up like this, you need to shut off your computer, and then separately ch...

May 12, 2017

Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises. These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). T...

May 11, 2017

On May 1, Intel published a security advisory regarding a firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). The vulnerability could enable a n...

May 10, 2017

Everyone should run windows update on their computers.  

Microsoft has released an urgent update to stop hackers taking control of computers with a single email.The unusual bug, in Microsoft anti-malware software such as Windows Defender, could be exploited without the...

May 4, 2017

From NBC News

An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday.


The w...

Please reload