You can use technology to drive competitive advantage and greater profit for your business, without assuming the burden of managing that technology. Find out how CT Technologies enables our customers to realize the business advantages of more advanced technology solutions by managing the complexity of IT.
Slim For iPhone Helps You Keep Up With Facebook, LinkedIn And More, Without Obsessively Checking For Updates
Russian security researchers have discovered that most of the 3G and 4G USB modems/sticks produced by Chinese hardware manufacturers, provided by mobile operators and telcos to their subscribers are wide open to attacks.
According to the researchers who tested many 3G and 4G modem sticks obtained from various telcos over the past few months, USB sticks produced by chinese hardware manufacturers Huawei and ZTE pose serious security threat.
The security researchers, Nikita Tarakanov and Oleg Kupreev have already managed to show many ways to attack the modems through software vulnerabilities.
This is possible because many chinese-made modems are identical, and therefore its software is very similar. Thus one can make an image of the modem’s file system, alter it and save it back on the modem.
The researchers pointed out that it appeared surprisingly easy to modify the software with the help of free instruments available from Huawei and other…
View original post 171 more words
Virus Bulletin 2003 (Thanks, Helen, for digging up a copy for me! I can’t believe I didn’t keep a proofed version.)
David Harley; Fact, Fiction and Managed Anti-Malware Services: Vendors, Resellers and Customers Divided by a Common Language; Virus Bulletin Conference Proceedings, 2003. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin.
This paper was on a topic very dear to my heart, at the time: part of my job was liaising with a company to whom part of our security was outsourced, against my advice. That would be the part of the job description section labelled “in-house scapegoat”.
Not all of the assumptions on which the malware management ethos is founded have changed since the 1980s. The anti-virus research community is aware of changes in malware technology, and in malware-management technology…
View original post 165 more words
Those days are over with Interlinks IT support from CT Technologies. Your systems are constantly maintained, monitored, updated, backed up so your network is RELIABLE! No more waiting, wondering or paying for down time. You get one fixed price for your own IT staff.