Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

In Case of Emergency, Activate Facebook’s Safety Check

In Case of Emergency, Activate Facebook’s Safety Check

In 2014, Facebook launched Safety Check, a helpful tool allowing users to “check in” that they’re okay during a crisis event, like a natural disaster, mass shooting, etc. Recently, Facebook made a major change to Safety Check by allowing users affected by the crisis to activate the feature. This is yet another example of how social media is changing the way people find out about major events and react to them.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Backup Malware Hosted Solutions Microsoft Mobile Devices Data Software Internet Windows 10 Innovation Network Security User Tips Smartphones Business Hardware Email Browser Tech Term Efficiency Computer Smartphone Disaster Recovery VoIP Productivity Business Continuity Miscellaneous IT Services Data Backup Ransomware Workplace Tips Android Productivity Cybercrime Business Management communications Chrome Alert Office Automation Windows Outsourced IT Data Recovery Network Cloud Computing Managed IT Services Save Money Artificial Intelligence Upgrade Communication Telephone Systems Server Computers Router Managed IT Services Internet of Things Windows 10 Money Virtualization Law Enforcement Social Media Facebook Small Business Collaboration Quick Tips Office Tips IT Support Passwords App Office 365 Applications Wi-Fi How To Cybersecurity Password Spam Social Engineering Holiday Health History Information Remote Computing BDR Google Drive Bandwidth Word Gadgets Bring Your Own Device Gmail Two-factor Authentication Operating System Mobile Device Management Settings Mobile Device Work/Life Balance HaaS Entertainment Vulnerability Marketing Voice over Internet Protocol Scam Hacking Microsoft Office Mouse Managed Service Provider Encryption Sports Flexibility Keyboard Safety Data Management Networking VPN Managed Service Mobility Data Protection Connectivity Data Breach Apps Data Security Application Recovery Phishing Private Cloud USB Managed IT Business Intelligence Best Practice Government Unsupported Software DDoS Update Training Public Cloud Downtime IT Support OneNote Botnet Mobile Computing User Error Human Resources Robot Servers Retail Physical Security Redundancy Big Data Data storage Wearable Technology Cleaning End of Support Identity Theft CES Electronic Medical Records BYOD Social Infrastructure Paperless Office Data Storage Charger PDF Avoiding Downtime Software as a Service Virtual Assistant Budget Meetings Content Management Comparison Spam Blocking Machine Learning Firewall Employer-Employee Relationship IT Management Google Docs YouTube Legal Telephone System Fraud Black Market Saving Money eWaste Blockchain Hiring/Firing Battery Telephony IT Plan Website The Internet of Things Access Control Patch Management Remote Monitoring Internet Exlporer Windows 7 Amazon Thought Leadership IBM Fax Server Environment Search Engine HIPAA NIST Employer Employee Relationship Netflix Files Education Outlook IT solutions Assessment Laptop Wireless Skype Recycling Two Factor Authentication webinar Search NarrowBand Authentication Risk Management Augmented Reality Google Apps Smart Office IT Consultant Video Games Screen Mirroring Display Flash Amazon Web Services Troubleshooting Supercomputer Uninterrupted Power Supply Bing Cryptocurrency Computer Accessories Computing Infrastructure Frequently Asked Questions Millennials Remote Work Nanotechnology Politics Television Touchpad Solid State Drive Start Menu People Warranty Criminal Conferencing How to Software Tips Multi-Factor Security Distributed Denial of Service Wireless Technology Remote Worker Workers Document Management Transportation Samsung Scalability Cast Computer Care Maintenance Security Cameras Practices Vendor Management Hybrid Cloud Online Shopping Addiction Travel Help Desk Staff Safe Mode Bluetooth Excel Workforce Smart Tech Public Computer Audit Tools Mobile Office Printer HVAC Emails Apple Trending Chromecast Notifications Wiring Benefits Leadership Instant Messaging WiFi Hacker Hosted Computing Content Sync Evernote Cache Books Current Events Monitor Root Cause Analysis Programming Biometrics Tech Support Internet exploMicrosoft Users Tip of the week Telecommuting Credit Cards Experience Computer Fan Customer Relationship Management Administrator Enterprise Content Management Save Time iPhone Unified Threat Management Password Manager Relocation Inventory Audiobook SaaS Information Technology Wireless Charging Wireless Internet Emergency Knowledge Reputation Running Cable Shadow IT Shortcuts Digital Signature Worker Advertising Virtual Reality Windows Server 2008 MSP Devices Music Automobile Techology FENG Value Customer Service Microchip Password Management HBO Specifications Streaming Media Windows 10s Social Networking Camera Business Mangement Smart Technology Humor Shortcut Going Green Cortana Wire Network Congestion Customers Data loss Vendor Accountants Rootkit Worker Commute Lithium-ion battery File Sharing Printers Managing Stress Regulation Twitter Thank You CrashOverride Congratulations Webinar Smartwatch IT solutions Company Culture Compliance
QR-Code