GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Smartphones Windows 10 Business Malware Network Security Ransomware Productivity Hosted Solutions Hardware Business Continuity Innovation Small Business Disaster Recovery Email Computer Android VoIP User Tips Internet Efficiency Alert Data Data Backup Mobile Devices Smartphone Telephone Systems Law Enforcement Upgrade Windows Social Engineering Cybercrime Quick Tips Cybersecurity Managed IT Services Money Collaboration Computers Outsourced IT Browser Managed IT Services Communications How To Server Social Media Miscellaneous App Virtualization Network Office Operating System Chrome Mobile Device Management Router Artificial Intelligence Passwords Data Breach Cloud Computing Business Management Office 365 Health Gadgets Flexibility Automation Google Drive Spam Safety Password Bring Your Own Device Office Tips Work/Life Balance Data Recovery Remote Computing Windows 10 History Wi-Fi Communication IT Services IT Management Microsoft Office Private Cloud Two-factor Authentication OneNote Apps Hacking HaaS Data storage Facebook Black Market Public Cloud Government Recovery Physical Security Unsupported Software Best Practice End of Support The Internet of Things Redundancy Phishing Workplace Tips Downtime Automobile Avoiding Downtime Spam Blocking Mobility Saving Money Productivity Gmail Internet Exlporer Marketing Data Management Bandwidth Data Storage Data Security Word Holiday Vulnerability Managed Service Provider Windows Server 2008 Remote Work Cleaning IT Consultant Remote Monitoring Mobile Device Music HBO Business Intelligence Users Managed IT Save Money Humor Laptop Telephony Online Shopping Lithium-ion battery Emails Computer Care Solid State Drive Windows 7 Identity Theft Tech Support Leadership IT Plan Update Video Games Wearable Technology Outlook Millennials Networking Data loss Virtual Reality Botnet YouTube Settings Chromecast Risk Management Multi-Factor Security Touchpad User Error Battery Skype Evernote IT Support Samsung Audit Going Green Patch Management Flash Credit Cards Shadow IT Employer-Employee Relationship Monitor Wireless Content Scalability USB Frequently Asked Questions Workforce Current Events Screen Mirroring Internet of Things Hybrid Cloud Worker Commute Travel Politics Trending Root Cause Analysis Education Start Menu Encryption Sports Value Computer Fan Search Scam Fraud Software Tips Audiobook Google Docs Apple Excel BDR Uninterrupted Power Supply Knowledge Cast PDF Keyboard Comparison Internet exploMicrosoft Computing Infrastructure Tools VPN Netflix NarrowBand FENG Files How to Sync Amazon webinar BYOD Reputation Entertainment Website iPhone Instant Messaging Tip of the week Telecommuting Network Congestion Robot Information Technology Windows 10s Legal Experience Specifications DDoS Meetings Advertising Applications Notifications IT Support Wireless Technology Relocation Amazon Web Services Conferencing Customers Techology Voice over Internet Protocol Books Thank You Charger Save Time Firewall Emergency Congratulations Hiring/Firing Worker Assessment CrashOverride Smart Technology Webinar WiFi Rootkit Television Two Factor Authentication Compliance Employer Employee Relationship IT solutions Troubleshooting Training Public Computer Regulation Computer Accessories Loyalty Transportation Big Data Vendor Management Electronic Medical Records Bluetooth SaaS Benefits

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.