Uncategorized

google-sync.jpg
One Email Protocol to Rule Them All

Email has been around for a long time now and has since branched out and found a strong foothold in modern business. The email systems of the past are shades of what they are today – yet it’s surprising to me that people are still oblivious to the 3 major protocols that our power our mail services. This is especially shocking given the important nature of these services so today we will be discussing what these major 3 email protocols are, and what differentiates them from one another.

Best Geek Gifts.png
Our Favorite Gadgets for the Techie in Your Life

With the holidays coming up there has been one thing on everyone’s mind: what do I get for the geek in my life? Techie oriented people can be difficult to shop for so we have complied a list of all the best gadgets and cool technology to make your life easier this Christmas season. There are lots of fun, new gadgets available today so picking between them can be tricky. Don’t settle on a BestBuy giftcard, get them something they will truly enjoy… or just treat yourself! 

IE-article-1024x645
Internet Explorer End-of-Life

Coming mid-January Internet Explorer web browser will come to the end of its life. According to Microsoft, starting on January 12th 2016 Internet Explorer 8, 9, and 10 will no longer be supported making IE11 the only version available. This is more than likely an attempt to transition away from Internet Explorer and into Microsoft????????s new Edge browser. This means you will have to upgrade to the newest version of IE or move right to Microsoft edge. There are also other internet browser options such as Google chrome, Mozilla Firefox, and more. If you feel like switching there are plenty of options available. IE 11 offers better security and performance compared to the previous versions and since it????????s still being supported there will be more security and performance updates to come. Those that opt to stay on unsupported versions will face compliance issues and potential exposure to digital vulnerabilities, and pose a greater risk for malware infections and data/identity theft.

bckgrnd_window
Crypto-Vigilance: TeslaCrypt Breakdown

TeslaCrypt is the latest in a series of viruses being termed as, “crypto-ransomware”. This is a particular problem because it is getting more difficult to protect against this ransomware as it constantly changes and is getting updated with more sophisticated logic to circumvent network security and endpoint protections like AV software. As well, most AV’s will not pick-up this virus in time as it technically doesn’t do anything considered ‘traditionally malicious’. TeslaCrypt uses COM+ sandbox evasion techniques and starts encrypting the files with the following extensions using AES encryption:

1 2 5