Tag Archives: vulnerability

New Windows update for PC vulnerabilities

Two newly discovered Windows vulnerabilities, known as Meltdown and Spectre, make it possible for hackers to steal all sorts of confidential information. To resolve this issue, Microsoft has released an update. Continue reading to stay protected. Issues with Microsoft’s Spectre and Meltdown patches After the January 3rd announcement of unprecedented security vulnerabilities, Microsoft has been […]

Posted in General Articles A, Windows | Also tagged , , , , , | Comments closed

Windows releases a new patch for PC users

Two vulnerabilities, known as Meltdown and Spectre, have been found affecting almost every Windows desktop and server. Computers affected by these two vulnerabilities are susceptible to having their data stolen, such as personal photos and passwords. As a countermeasure, Windows developers have released an update for Windows users. Here’s everything you need to know. Issues […]

Posted in General Articles C, Windows | Also tagged , , , , , | Comments closed

Issues found for new Windows patches

Despite security being one of Microsoft’s top priorities, it has been recently discovered that there are two vulnerabilities in computer chips, named Meltdown and Spectre, that put private data in jeopardy. As a solution, Microsoft has released an update to fix this vulnerability. Issues with Microsoft’s Spectre and Meltdown patches After the January 3rd announcement […]

Posted in General Articles B, Windows | Also tagged , , , , , | Comments closed

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured […]

Posted in General Articles A, Security | Also tagged , , , , , , , , , , , , , | Comments closed

Enlist IT help when installing CPU updates

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released. Let’s review […]

Posted in General Articles C, Security | Also tagged , , , , , , , , , , , , , | Comments closed

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]

Posted in General Articles B, Security | Also tagged , , , , , , , , , , , , , | Comments closed

Fantom: the latest cybersecurity spectre

It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

Posted in General Articles A, Windows | Also tagged , , , , , , , , , , , , | Comments closed

How Fantom is haunting unsuspecting users

The heart of a lady is not easily won; a man can’t rely on his looks or wallet to make a girl fall head over heels. He must charm his way into her heart. Let’s say that a computer user is the woman, and that ransomware, the man, is the dreamboat that has worked his […]

Posted in General Articles C, Windows | Also tagged , , , , , , , , , , , , | Comments closed

Ransomware appears as fake Windows Update

Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable. […]

Posted in General Articles B, Windows | Also tagged , , , , , , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.