Category Archives: Uncategorized

Microsoft Releases Patch for Critical Internet Explorer Vulnerablity

  Microsoft has released a security update for Internet Explorer to resolve the critical vulnerability announced earlier this week. The Internet Explorer vulnerability could be exploited to give a remote attacker control of a user’s computer, letting them install more malicious software onto the machine. This update will be downloaded and installed automatically through Windows […]

Posted in Uncategorized | Comments closed

Important WordPress 3.5.2 Security Update Available

WordPress has released update 3.5.2 to fix serious security vulnerabilities that could allow an attacker to compromise a WordPress installation. WordPress.org and US-CERT recommends that you update your WordPress installation. Important: Backup all your WordPress files and database before any update. To automatically update WordPress: Sign into the Admin Dashboard and select Updates from the […]

Also posted in Website Security | Comments closed

Hurricane Sandy – A lesson in disaster recovery

Barrels of diesel fuel to be carried up 17 stories for data center generator. (Fog Creek) Hurricane Sandy was much larger and more destructive than anyone could have predicted. Besides the tragic loss of life and families displaced, much of lower Manhattan and large parts of the surrounding areas on Long Island and New Jersey […]

Also posted in Safe Computing | Comments closed

Barnes & Noble reports Credit and Debit Card Breach – List of Stores

Barnes and Noble reports that 63 of its stores were hacked and credit card and bank card pin numbers were stolen. Online purchases and campus stores are not affected. Three stores in MA are on the list: Chestnut Hill, Hingham, and East Walpole. Barnes and Noble advises customers of the hacked stores to change their […]

Also posted in Safe Computing | Comments closed

iPhone theft on the rise

Two reports detail unfortunately what many already know, iPhones are magnets for crime. In New York City 40 percent of robberies, and almost half of all robberies in San Francisco involve the iPhone. From one police report: the suspects demanded the victims hand over their iPhones, police said. The first victim complied, but the second […]

Also posted in Safe Computing | Comments closed

Flaw in pacemaker could allow mass murder

This week the medical device industry received more disturbing news about the state of their technology. We tweeted that medical devices such as imaging and neonatal monitors in hospitals are infected on a large scale with computer viruses and malware. Now, a researcher has demonstrated vulnerabilities in pacemakers that allow for wireless remote attacks that […]

Also posted in Safe Computing | Comments closed

Remove Bloatware from your New PC

You don’t have to live feeling bloated anymore! New computers that come pre-installed with Windows often arrive full of what is called bloatware. Bloatware are trial version of applications installed by the pc vendor at the behest of software companies. The software companies hope that the user will feel compelled to purchase the application once […]

Posted in Uncategorized | Comments closed