Blog
Your Last.fm Password Could Have Been Compromised In 2012
Are you familiar with the music service, Last.fm? If you used the service at any point in 2012, your password could be compromised. This is the latest find announced by LeakedSource, which provides an online listing of data breaches from around the web, as well as a repository that contains copies of the stolen data. […]
Twitter Updates To Ease Certain Restrictions And Limits
Longer Tweets are finally coming! Maybe. At some point. It is the company’s single most requested feature: an easing of the tight, 140-character restriction on Tweet length. And although the company has often reiterated that it was holding fast to the limit, they’ve recently announced a willingness to reverse course in a limited fashion. Twitter’s […]
Tesla Latest To Get Hit With Remote Car Hack
Tesla isn’t the first automaker whose increasingly automated vehicles have been hacked, but they are the latest. Fortunately, the hackers weren’t real hackers, but security researchers working for a firm called Keen Security Lab. The results, however, were disturbing to say the least. If you own one of Tesla’s vehicles, then you know how much […]
iOS Vulnerability Also On Mac Computers OSX
Last month, a devastating security flaw was found in iOS. The flaw that was discovered was a chained trio of zero day exploits that, if executed in the proper order, would allow a hacker to take total control over your iPhone. They would literally have unfettered access. Apple was quick to issue a patch for […]
USB-C Growing: May Carry HDMI Signal In The Near Future
The development of USB-C cables has generated quite a lot of excitement in the industry – even more now that there are standards in place to prevent faulty cables from being sold. This had been an issue in months past, where shoddily-made USB-C cables didn’t handle or monitor the throughput of power properly, resulting in […]
Your Next HP Printer May Be A Samsung
HP, a giant in the printer industry, is looking for new ways to grow its business. As hardware companies have been seeing a steady erosion of revenue, HP isn’t taking it lying down. In response, the company has finalized an agreement to acquire Samsung’s printer division, which will give it a complete line of printers […]
Some Seagate Network Attached Storage Devices May Be Hosting Malware
Thousands of publicly accessible FTP servers, including a number from Seagate network-attached storage devices, have been found on the internet that have been broken into, corrupted and are currently hosting cryptocurrency-mining malware. This is according to the latest report released by security researchers from Sophos. The research team made the discovery when they were tracking […]
iPhone 7 Improves On Device That Has Sold A Billion Units
Some, perhaps even many, people might think that it would be hard to improve on the iPhone. After all, Apple’s flagship product has sold more than a billion units, so people clearly like it, but Apple has done just that. The new phone is a wonder of both technology and design. Here’s what you can […]
Software Bug Causes Recall Of Millions Of GM Vehicles
GM has given the world a first: a recall of up to four million of the vehicles it has manufactured. Of course, recalls are nothing new, especially in the auto industry. However, what makes this one unique is that the recall is being issued because of a bug in the software of GM vehicles that […]
Huge Yahoo Breach Affects More Than Half A Billion Accounts
The hackers have struck again, and this time, they seem to have hit the Mother Lode. Yahoo recently announced that they’ve been hacked, and that at least a half a billion user accounts may have been compromised. Yes, that billion, with a “B.” The announcement was made when a portion of the database was found […]

A Visionary Approach to Your Security
The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.

