Blog
SVG Images Getting Wider Distribution As Malicious File Type
JavaScript is hands down the tool of choice of hackers who are interested in inserting malicious code onto a user’s device. Most commonly, scripts are embedded in compressed (zipped) files, and when unpacked, install on the user’s machine without him or her even being aware of what’s going on. The problem has reached such epic […]
New Memory That Acts As Processor Could Speed Up Devices
ReRAM is coming to a computer manufacturer near you, and soon. If you haven’t heard of this technology yet, you’re not alone, but it is one of the most exciting developments in the world of processors and chipsets in literally years. Under the hood, memory is used as a storage device, and processors do the […]
Update Netgear Routers Firmware Or Risk Password Compromise
It hasn’t been a good time for Netgear. In recent months, security researchers across the industry have identified several critical security flaws that could leave your network exposed and vulnerable to attacks. The most recent were discovered by the security firm Trustwave which reported their findings to Netgear. These flaws revolve around the ability to […]
Dropbox Users Get New Collaboration Doc Feature Called Paper
In recent years, Dropbox has been struggling to find its way. Having realized that there’s little money to be made in simply being a cloud storage service, they’ve been experimenting with a number of incentives and add-ons in an effort to lure customers into buying the premium version of their product. Paper is the company’s […]
Chrome OS May Get Some Competition From Windows 10 Cloud
Windows hasn’t had much luck with scaled down operating systems, but there have been hints that the company is about to try again. This time, the company will try with a product called Windows 10 Cloud. Two of their earlier efforts, Windows CE and RT, didn’t go anywhere. The company’s bold experiment with Windows 8.1, […]
Android HummingBad Malware Back, Now Called HummingWhale
It is an article of faith that Google’s Play Store and Apple’s iStore are the two safest sources for downloading apps. As good as their security routines are, however, they’re not perfect, and sometimes, things slip through the cracks. The world got a painful reminder of their fallibility last year when a group of hackers […]
Lego Creates New Social Network For Kids
Here’s’ an interesting and inspiring story about corporate inventiveness and good citizenship. If you grew up playing with Legos, then you know that half the fun of them is in sharing your creations with others Adults, of course, have plenty of platforms to share on, but those platforms don’t tend to be kid-friendly, and because […]
Facebook Attempting To Fix Password Recovery To Minimize Hack Possibility
Password security continues to be the single biggest weak point in the realm of digital security. The problems on this front are numerous, but chiefly stem from the facts that: • Too many people use simple, easily guessed passwords • Too many people use the same password across multiple accounts • And too many people […]
Using Android Pattern Lock May Not Be Best Phone Security
If you use an Android device, and since they are the most popular devices on the planet these days, you probably do, then you may also be using a pattern locking mechanism to secure it. On the face of it, that seems to make a lot of sense. After all, given the number of high […]
Not Even Police Can Avoid Ransomware – Back Up Regularly!
How’s your network security? Is it on par with police departments, which, you’d have to imagine, have fairly robust security? If so, you’re still not safe. Recently, police in Cockrell Hill, Texas, announced in a press release that they had been the victim of a ransomware attack that cost them dearly. The hackers demanded $4000 […]
A Visionary Approach to Your Security
The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.


