Blog
Search Results Look Weird? You Might Be Infected
Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of malware known as Redirector.Paco. There are actually two flavors of this malicious software, the key differences between them is that […]
Have Bots Taken Over The Internet?
What percentage of total internet traffic would you estimate that bots (non-human visitors) account for? Twenty percent? Thirty percent? Unfortunately, according to data released by DeviceAtlas, a company that makes software to detect the kinds of devices web visitors are using, reveals that non-human sources account for a staggering 48% of all web traffic. This […]
That USB Phone Charger Might Be Stealing Your Data
If you haven’t yet heard of “KeySweeper,” you have a new threat to be on the lookout for. The KeySweeper device is built with off the shelf, Arduino components. These can be programmed for a variety of purposes, but the hacking community is using them as stealthy keylogging devices. By all outward appearances, the device […]
Don’t Turn Off Security Updates To Avoid Windows 10 Upgrade
In recent months, Microsoft has made a number of very good, highly popular moves that have had its customers raving about its apparent change. This latest incident, however, isn’t one of those. Microsoft has been accused of resorting to malware-style tactics to try and force Windows 7 and 8 users to upgrade to Windows 10, […]
Are You Ready For A 10 Core Processor?
You’ve probably got either a dual- or quad-core computer sitting on your desk right now, but if you love bleeding edge technology, then you’re going to want to upgrade after reading this. Recently, at the Computex trade show in Taipei, intel unveiled its first ever 10-core processor, designed for the home market (although why these […]
A Number Of Major Manufacturer Laptops May Have Security Risks
Security firm Duo Security recently published a disturbing report relating to laptop security. It found critical security flaws in laptops produced by five of the largest OEMs: Acer, Asus, Dell, Hewlett-Packard, and Lenovo. If you’ve purchased, and are currently using laptops from these manufacturers, you are potentially at risk. Specifically, what the security firm found […]
Microsoft Is Putting A Stop To Your Bad Passwords
Most of us (and you know who you are) tend to be not-very-good when it comes to creating robust, secure passwords. If you’ve ever used your significant other’s birthday, your birthday, the word “password,” or the numbers “123456,” then you’re not alone. Millions of other people do too, and Microsoft is taking steps to help […]
New Ransomware Replicates Itself Says Microsoft
You’ve probably seen the joke email before. Something to the effect of, “If you don’t forward this message to six people within twenty-four hours, your teeth will fall out, your car will break down, and all the files on your computer will be deleted.” Ransomware isn’t quite to that level yet, but it’s getting awfully […]
Tumblr and Myspace Latest Companies To Get User Accounts Hacked
Not long ago, we learned that last year’s high profile LinkedIn hack was much bigger than initially thought. When the hack occurred, the company assured its user base that it was limited in scope to some 6.3 million user accounts (LinkedIn has some 400 million users all told, which made this a serious breach, but […]
Did You Get A USB Drive From The ADA? Don’t Plug It In
Not even dentists are safe from hackers, and if they’ve been targeted, your company could easily be targeted in much the same way. Recently, the ADA (American Dental Association) sent USB flash drives out to dental offices all over the country. The drive contained updated billing rates and instructions for filing claims with various insurance […]

A Visionary Approach to Your Security
The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.

