Category Archives: Blog
There’s a new side channel attack to worry about. This one is after the target system’s OS page cache, where a variety of sensitive data that has been accessed by the device’s owner is stored for rapid retrieval. Perhaps the worst and most ominous aspect of this newly identified threat is the fact that it’s […]
One of the exciting new features offered by the latest smartphones is facial recognition, which allows users to unlock their devices simply by looking at them. On paper, it’s a great feature and incredibly convenient, but there’s a problem. The issue was uncovered by a non-profit group called the Dutch Consumentenbond, which tested more than […]
Two new critical flaws have been discovered in Adobe Acrobat and Reader that require your urgent attention. In fact, the flaws were rated as so severe that the company broke with its tradition of releasing security updates around the middle of the month in coordination with Microsoft’s “Patch Tuesday”. They released an update sooner this […]
Google has been busy in recent weeks. They’ve removed a staggering 85 apps from their Play Store when they discovered that they were pushing highly aggressive adware to the users who downloaded them. The apps the company removed were wearing a number of disguises, passing themselves off as everything from games, to remote control simulators, […]
It’s been the better part of two years since the outbreak of the Wannacry ransomware epidemic. Unfortunately, all this time later, some companies are still dealing with the fallout. According to the latest research, Wannacry is still infecting hundreds of thousands of computers around the globe. As grim as that sounds, it’s not all bad […]
Are you still using Internet Explorer? Now you have a new reason to consider switching to a more up to date browser. As most people know, Microsoft essentially gave up on Explorer after it failed to gain ground against its major competitors in the browser ecosystem. They started fresh, with Microsoft Edge, designed as a […]
According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide. To say that it gets a lot of traffic every day would be an understatement, which is why a newly discovered phishing campaign pretending to come from Amazon is so disturbing. Although Amazon sees heavy traffic every […]
Google is taking additional steps to protect its Chromebook user base. Currently, if a hacker has physical access to your machine, he or she could insert a flash drive in the USB port and run malicious code from it. The company is adding a new feature called USBGuard, which blocks USB port access any time […]
by CIO Applications Magazine Healdsburg, Jan 10, 2018 – Fusion Technology Solutions is proud to announce they have been selected by CIO Applications Magazine for their Top 25 Cloud Solutions providers 2018 list. The selection is based on the company’s dedication to providing customers with optimized cloud solutions and performance. The annual list of companies […]