IT SPECIALISTS

Insights

Blogs, resources and industry news
No items found.

Small-to-medium businesses can remain agile by embracing technology to fuel their long-term strategy and lessen the impact of inflation.

Download

The role of the CIO has evolved over time. This eBook examines an emerging alternative worth considering, the Virtual CIO (vCIO).

Download

21/9/2024

Professional social networking site LinkedIn allegedly used data from its users to train its artificial intelligence (AI) models, without alerting users it was doing so. According to reports this week, LinkedIn hadn't refreshed its privacy policy to reflect the fact that it was harvesting user data for AI training purposes.

Read More

9/10/2024

Ethical hacker Christopher Hawkins shares the common mistakes he sees people making when accessing the internet in public.

Read More

20/9/2024

Microsoft is launching a Windows app for macOS, iOS, iPadOS, web browsers, Android devices, and even Windows PCs. The Windows app is essentially a hub for streaming a copy of Windows from a variety of sources, including Windows 365, Azure Virtual Desktop, Remote Desktop, and more.

Read More

6/8/2024

Hackers delivered malware to Windows and Mac users by compromising their Internet service provider and then tampering with software updates delivered over unsecure connections, researchers said.

Read More

6/8/2024

With macOS Sequoia this fall, using apps that need access to screen recording permissions will become a little bit more tedious. Apple is rolling out a change that will require you to give explicit permission on a weekly basis to these types of apps, and every time you reboot your Mac.

Read More

5/8/2024

The Hunters International ransomware group is targeting IT workers with a new C# remote access trojan (RAT) called SharpRhino to breach corporate networks. The malware helps Hunters International achieve initial infection, elevate their privileges on compromised systems, execute PowerShell commands, and eventually deploy the ransomware payload.

Read More

15/7/2024

You might think that a threat actor only having your phone number isn’t dangerous, but it can be, which is why it’s important to learn what hackers can do with it. With just your phone number, hackers can send you phishing texts and calls, flood your phone with spam calls, spoof your phone number, swap your SIM card and even steal your personal information.

Read More

18/7/2024

Microsoft’s AI-powered Designer app is coming out of preview for both iOS and Android users. Microsoft Designer lets you use templates to create custom images, stickers, greeting cards, invitations, and more. Designer can also use AI to edit images and restyle them or create collages of images.

Read More

15/7/2024

Researchers from Cyber Press found 1.1 terabytes of leaked data from Disney’s internal Slack on infamous data leak forums. The data was leaked by an infamous hacking group known as “NullBulge,” which revealed the data that was stolen from the Disney database.

Read More