Virtual Time ~ Parallel Processing

Virtual Time

Virtual Time is a subject I studied in my early days right out of college.  It’s a concept we explored while thinking about the biggest problem computer processing would eventually experience: the speed of the electron. No matter how short the distance you make between two elements that process data, you will find the bottleneck […]

Virtual Time Read More »

Malware that can get past your Anti-Virus Scanner…

There is a new technique Cyber-thugs are using to attack Internet users that allows Malware to get past your Anti-Virus Scanner. This article was e-mailed to me on Wednesday, February 14, 2018. It comes from CyberHeist News, a research firm in cyber security. According to researchers at McAfee, a new malware campaign is targeting organizations

Malware that can get past your Anti-Virus Scanner… Read More »

Scammers Using Webforms

Scammers Using Website Forms To Commit Fraud

Scammers are looking at every avenue, it now appears, to defraud businesses of their hard earned money, using a technique called “spear phishing” via company web forms. Normally spear phishing takes place when scammers send e-mails to potential victims “ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential

Scammers Using Website Forms To Commit Fraud Read More »

Verge Article Petrwrap Ransomware

New Ransomware Attack Underway – Identified As Petrwrap

Petrwap Ransomware Attack Underway In Europe The Verge just reported that a new Cyber Attack is underway in Eastern Europe. Kaspersky Laboratories has identified it as Petrwap, a strain of the Petya ransomware it identified back in March. The company suspects that it has been in the wild for a while now, although tests show

New Ransomware Attack Underway – Identified As Petrwrap Read More »

"Information" Castle

Single Sign-On Security Breached at OneLogin

Yet another troubling reminder that breaches are inevitable. OneLogin is a service, developed by the company, OneLogin, Inc., that provides single sign-on and identity management for cloud-based applications, whereby all of your passwords and other secure credentials can be stored and used to unlock applications and access to secure storage areas in your digital environment.

Single Sign-On Security Breached at OneLogin Read More »

Are you looking for IT support for your business?

Are you looking for IT support for your business? With over 20 years of experience in IT, there isn’t much we haven’t seen. From network outages and computer viruses to infrastructure migrations and application updates, we can help you meet your IT challenges and accomplish your goals, and ultimately keep your business running smoothly on

Are you looking for IT support for your business? Read More »

Disaster Recovery isn’t just for the big boys anymore – Backup Strategy

It’s 1:15PM on a Friday, and you’re on a call with a prospect who wants to make an appointment to meet with you. You open your Contact Management program, which doubles as your inventory and billing solution, and suddenly your computer starts acting really funny. You maintain your cool with the prospect as you reach

Disaster Recovery isn’t just for the big boys anymore – Backup Strategy Read More »

Scroll to Top