Blog

Blog

Millions of Twitter Accounts Compromised

Once more into the breach with Twitter. A company called LeakedSource claims to have gotten its hands on a database containing some 32 million Twitter passwords associated with accounts via email (rather than user name). Although per the company’s information on the database, most of the passwords come from Russia, it certainly wouldn’t hurt to […]

If Your Netflix Password Was Automatically Reset Take Action

The recent revelations about hundreds of millions of user names and passwords showing up for sale on the Dark Net from sites like Twitter, LinkedIn and MySpace has sent ripples of uncertainty through the entire digital world. If the data breaches of those companies were so much larger than it was originally thought, what other […]

Does Your Cloud Storage Contain Infected Files?

More and more business are migrating increasing amounts of data to the cloud. That’s generally seen as a good thing, but there’s a fly in the ointment. The cloud, which is regarded by many to be safer and generally more secure, is seeing a rise in malware infected files. This information comes to us courtesy […]

Upgrading a Samsung Computer To Windows10? Wait For Now

If you have a Samsung desktop or laptop and are still running some version of Windows 7, hold off on upgrading, at least for now. Despite having more than two years to get their drivers in order, the company still isn’t ready, and some users who attempt to upgrade to Windows 10 from version 7 […]

Remove Or Update Flash From Your System Now

Another month, another Flash vulnerability. This time, it’s designated as CVE-2016-4171 (details here: https://helpx.adobe.com/security/products/flash-player/apsa16-03.html ). This is yet another critical vulnerability, identified by Kaspersky Labs. So far, this hack has been spotted in the wild, being used in limited, targeted attacks. If successful, a hacker can crash your system, then take control over it when […]

Accounts Hacked – Change Your Password If You Use TeamViewer

TeamViewer, the company behind a popular remote desktop platform, which allows users to share their screens, access their computers remotely, or participate in online conferences, has been hacked…maybe. A little over a month ago, the company received reports from a cross-section of users who claimed that their accounts had been accessed by unauthorized users. The […]

Not Even Your Chats Are Safe From Hackers

Online security company Check Point Software Technologies has discovered a flaw in Facebook’s chat app that allows hackers to log in and change the content of chat messages (individual messages or entire chat streams) without notifying users that changes have been made. The exploit is accomplished by finding the unique identification number associated with each […]

New Postage Sized SSD Means Smaller Devices Coming

The push toward ever greater miniaturization has been present in the technology industry from the very beginning. Computers that once occupied whole rooms got small enough to fit onto any available desktop. PCs gave way to laptops, which are currently giving way to a variety of handheld devices, and still, the drive to make equipment […]

Are You Doing Enough To Educate Employees On Security Risks?

Your employees are both your company’s greatest asset and your biggest potential security risk. In a recent study conducted by Experian Data Breach Resolution and Ponemon Institute, it was found that 55% of companies surveyed have experienced one or more security incidents where the catalyzing event was a negligent or malicious employee. The study also […]

Android Provides Additional Find-Your-Phone Option

If you’re one of the millions of users with an Android phone, then you already know there are a couple of different ways you can find it if you happen to misplace it. You can use the built-in search feature, or the Device Manager app. As of now, Google has rolled out an additional option, […]

A Visionary Approach to Your Security

The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.

To top