Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

In Case of Emergency, Activate Facebook’s Safety Check

In Case of Emergency, Activate Facebook’s Safety Check

In 2014, Facebook launched Safety Check, a helpful tool allowing users to “check in” that they’re okay during a crisis event, like a natural disaster, mass shooting, etc. Recently, Facebook made a major change to Safety Check by allowing users affected by the crisis to activate the feature. This is yet another example of how social media is changing the way people find out about major events and react to them.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hackers Hosted Solutions Malware Backup Microsoft Software Internet Network Security Innovation User Tips Mobile Devices Data Windows 10 Email Smartphones Productivity Efficiency Hardware Browser Workplace Tips Business Tech Term VoIP Disaster Recovery IT Services Productivity communications Business Continuity Smartphone Computer Data Backup Ransomware Business Management Android Miscellaneous Windows Cloud Computing Network Cybercrime Office Data Recovery Automation Alert Server Outsourced IT Chrome Internet of Things Communication Save Money Upgrade Telephone Systems Windows 10 Quick Tips Artificial Intelligence Managed IT Services Computers Managed IT Services Router Facebook Money Social Media Law Enforcement Collaboration Small Business IT Support Health Cybersecurity Virtualization Mobile Device App Holiday Gadgets Social Engineering Applications Operating System Wi-Fi Spam Office 365 Password Office Tips Passwords How To Private Cloud History Encryption Word Remote Computing Phishing Work/Life Balance Bandwidth Information Bring Your Own Device Gmail Mobile Device Management Settings Google Drive Two-factor Authentication BDR Mouse Managed Service Provider Sports HaaS Data Security Data Management Hacking VPN Networking Meetings Flexibility Application Scam Microsoft Office Recovery Paperless Office Voice over Internet Protocol Managed Service Vulnerability Safety Data Protection Mobility Connectivity Apps Entertainment Marketing Keyboard Data Breach Avoiding Downtime Firewall Employer-Employee Relationship Mobile Computing Retail Wearable Technology Cleaning Comparison Robot IT Management Google Docs Government Hiring/Firing Augmented Reality Spam Blocking Human Resources Cryptocurrency Public Cloud Downtime IT Support Servers Patch Management USB IT Plan Website Social Telephony Remote Monitoring Physical Security Budget YouTube Windows 7 Managed IT Data storage CES Business Intelligence End of Support Identity Theft Training Infrastructure eWaste Unsupported Software Software as a Service Update Virtual Assistant The Internet of Things PDF OneNote Botnet Content Management Internet Exlporer Saving Money Machine Learning Big Data Best Practice Telephone System Electronic Medical Records DDoS Redundancy Legal Blockchain Fraud Charger User Error BYOD Battery Access Control Black Market Data Storage Save Time Search Engine Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Telecommuting Worker Commute Amazon Thought Leadership Audiobook SaaS Recycling Emergency Knowledge Digital Signage Files Education Authentication Worker Computer Fan Smart Office Maintenance Music Automobile Mobile Office Display Search Chromecast Laptop Wireless Google Apps Notifications Bing Video Games Smart Technology Database Windows Server 2008 Amazon Web Services Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Remote Work Nanotechnology Rootkit Warranty FENG Value Workers Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Help Desk Data loss Scalability Staff Safe Mode Two Factor Authentication webinar Business Technology Hybrid Cloud Online Shopping Programming Addiction Biometrics Risk Management Assessment HVAC IT Consultant Running Cable Shadow IT Proactive IT Outlook Smart Tech Customer Relationship Management Printer Troubleshooting Supercomputer Hacker Apple Hosted Computing Computer Accessories Streaming Media Wiring Skype Screen Mirroring Instant Messaging Conferencing Biometric Security Flash Evernote Cache Politics Television Monitor Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Internet exploMicrosoft Users Credit Cards Customer Service Vendor Management Lithium-ion battery Administrator Password Manager Shortcut Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory Social Networking Bluetooth Unified Threat Management Solid State Drive Start Menu Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Emails NarrowBand MSP Information Technology Wireless Charging Wireless Internet Travel Reputation Password Management IT solutions Benefits Leadership ISP Excel Workforce Advertising Virtual Reality Devices Fax Server Content Microchip Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending Camera Audit Tools Techology Experience People Vendor WiFi Humor Accountants Distributed Denial of Service Wireless Technology File Sharing Sync Going Green Cortana Wire Managing Stress Thank You Printers Regulation IT solutions Twitter Congratulations CrashOverride Company Culture Compliance Webinar
QR-Code