508-909-5961 [email protected]

Although they may not garner the fervor of hardware releases and refreshes, iOS updates still manage to bring even the most casual of iPhone and iPad users out of the woodwork. Those who were willing to brave the bugs of Apple’s beta got a chance to play with the most recent version of the mobile […]

2016september12_iphone_bAlthough they may not garner the fervor of hardware releases and refreshes, iOS updates still manage to bring even the most casual of iPhone and iPad users out of the woodwork. Those who were willing to brave the bugs of Apple’s beta got a chance to play with the most recent version of the mobile platform, but the rest of us have been patiently awaiting its release. The time has finally come. Let’s take a closer look at iOS 10’s release details.

In keeping with its yearly mid-September schedule, the next update to iOS will be released on September 13th around noon (depending on your time zone). Before updating, it’s a smart idea to begin charging your phone and connect to a wireless network. Once you’re all set for the lengthy download and installation, go to your Settings dashboard, then tap General, and finally Software Update. This screen will give you detailed information on the latest update and the option to ‘Download and Install.’

As we’ve seen in the past, not all Apple devices can handle the RAM-hungry features of a new operating system. If you’re still holding onto any iPhone model older than the iPhone 5, you won’t be able to download the update. Unfortunately, the same goes for the original iPad Mini and the Retina/third-generation iPads. And although they’re not too common nowadays, the sixth generation iPod Touch will get iOS 10, while anything older will not.

We’d be remiss if we didn’t warn our readers, however; just because your device is eligible doesn’t mean updating it is the best idea. Older hardware wasn’t designed with the requirements of current software in mind, and updating may result in a significant slowdown of your phone or tablet. Furthermore, despite going through a beta stage, there’s no guarantee that all the bugs have been worked out of the system yet. We recommend waiting a day or two until Apple’s servers aren’t overburdened and other users have had a chance to suss out any problems.

Something as simple as updating your phone can become immensely frustrating if you’re not fully prepared. And despite what you may think, no task is too small for us to consider. If you think helping you update your phone, or even just configuring it to receive work emails is too mundane for your neighborhood managed services provider -- think again. Stop searching for the iOS update menu and call us today.

Published with permission from TechAdvisory.org. Source.

Read More

When an archaeologist discovers relics of a long-forgotten dynasty, mixed emotions ensue. The thrill of stumbling upon something untouched intertwines with a slight dread of working with something you know nothing about. The same notion is applicable to smartphones, in particular, operating system updates. Android’s latest update, Nougat, for example, has also evoked a mix […]

2016September9_AndroidPhone_BWhen an archaeologist discovers relics of a long-forgotten dynasty, mixed emotions ensue. The thrill of stumbling upon something untouched intertwines with a slight dread of working with something you know nothing about. The same notion is applicable to smartphones, in particular, operating system updates. Android’s latest update, Nougat, for example, has also evoked a mix of emotions, from excitement to suspicion. Cast doubts aside by looking through the top 9 features from Android Nougat.

Split-screen multitasking

With the new split-screen multitasking view, users are able to use two apps simultaneously. Hit the overview button and select the app you want to use to the top of the screen, then the second one beneath it. Windows are resizable as well.

Out with the old and in with the new (emojis)

The update comes with an additional 72 new emojis to the roster, with brand new characters such as the selfie, bacon, and even an avocado emoji as well. On top of skin tone variations, 14 new emojis are added to the “animals and nature” category and 12 to the “activities” category.

Customizable quick settings

Quick settings, aka the school of shortcuts, are now fully customizable. This means you can rearrange them or even add new ones as you see fit.

Notification reply

The latest update allows you to reply to notifications without the hassle of switching apps -- totally ideal for quick replies to emails and texts.

Quick Switch

This new multitasking feature allows you to quickly shift between your two most recently used applications. Simply double tap the overview button to toggle between the two.

Split-screen gesture shortcut

Ideal for power users, the split-screen gesture shortcut generally requires a few steps for activation. There is a hidden setting that allows you to do the same with just one gesture. Start by enabling the “Systems UI Tuner” by tapping the settings icon from the notifications shade. Wait for a vibration and then let go to activate it.

From there, go to Settings > System UI Turner > Other > Enable split-screen swipe-up gesture and turn the setting on. From there, you can switch to split-screen from any app by simply swiping over the overview button.

Advanced notification controls

Enable the setting for “Power notification controls” by going to System UI Turner > Other > Power Notification Controls. This allows you to prioritize settings by the application as well as designate the actions a notification can take.

Data Saver

The Data Saver mode reduces the amount of data your applications use in the background.

Call blocking

Numbers that you’ve blocked from texting and calling are now shared with other applications, ensuring that the same numbers will remain blocked across all applications.

Much like when you move residences, the intricacies of a newly updated operating system require patience and a willingness to learn new things. After a while, you get used to the system and the novelty wears off quicker than you can say ‘Nougat.’ If you have any questions concerning the aforementioned updates, do not hesitate to get in touch with us. We’ll get you the answers in no time.

Published with permission from TechAdvisory.org. Source.

Read More

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case. VMware, one of the leading virtualization software vendors, […]

2016september8_virtualization_bUntil now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case. VMware, one of the leading virtualization software vendors, released a vital patch to a number of their products to combat unauthorized users attempting to gain undeserved privileges. Keep reading for an update on how it affects you.

Since its first software release in 2001, VMware has remained the leading provider of virtualization platforms, with most sources estimating double-digit leads in market share over the nearest competitor. By creating virtual environments stored on a network server or in a cloud environment, the company has given their clients the ability to create workstations, software, and even networks that can be utilized remotely. Fast forward to today, and VMware is working overtime to maintain its reputation by preempting software security vulnerabilities.

Obviously, when delivering any kind of specialized privileges over a network, adequate protection is of the utmost concern. In this case, two services for managing mobile clouds (vIDM and vRealize) were found to be vulnerable to exploits wherein users with minimal rights could cheat their way into full administrative privileges.

The security team at VMware elaborated that when executed in just one of the two services, this flaw would not be considered critical. However, when combined, it could pose an imminent threat to the security of your cloud infrastructure. To amend this oversight, ask your managed services provider or IT staff to update vIDM and vRealize to their most recent versions (2.7 and 7.1, respectively) as soon as possible. If this can’t be achieved in a realistic time frame, blocking port 40002 would act as a temporary workaround.

Sufficient security requires by-the-minute responses to the latest breaches and exploits. By partnering with us, you’ll never need to worry about checking in regarding patches or breaches you read about in the news. Instead, you’ll be hearing about them from us when we come around to install the updates. Choose the safe option -- contact us today with any of your virtualization needs or questions.

Published with permission from TechAdvisory.org. Source.

Read More

Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable. […]

2016September7_MicrosoftWindowsNewsAndTips_BUnlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable. A case in point is Fantom -- here are some of the reasons why you should steer clear of this technological spook.

AVG security researcher Jakub Kroustek recently spotted Fantom coded atop an EDA2, a ransomware-building kit that was open-sourced but eventually taken down. EDA2 contained certain flaws that allowed researchers to obtain decryption keys from its C&C server, yet these flaws have since disappeared, indicating that Fantom coders might have found and fixed them before anyone else had a chance to.

Very little is known as to how Fantom is distributed. As for the method of deployment, cybercriminals plant the file onto the target’s computer via spam email or exploit kits. Fantom-infected files are named criticalupdate01.exe; they utilize a “Windows Security Update” to prompt targets into running the file.

After activation, the ransomware starts by locking the user’s screen while displaying fake Windows Update graphics, complete with a fully-functioning percentage-based loading timer that mirrors the original Windows Update screen. However, beneath this pleasant facade, Fantom is encrypting your files right before your eyes. Luckily, the temporary lock screen is removable before it reaches 100% -- simply press CTRL+F4. Unfortunately, the encryption process remains intact.

The MalwareHunterTeam states, “The ransomware uses classic ransomware encryption by locking files using an AES-128 key and then encrypting this key with a dual RSA key, with the private key stored on the crook's server, and a public key left on the user's PC.”

In order to retrieve the private key to unlock your files, you must contact the perpetrators by email. The email address is listed in the ransom note that appears after the process of encryption is complete. Fantom displays ransom notes in the form of HTML and TXT files, while changing the user’s desktop with a custom screenshot that lists the contact details. Lastly, after completing all its operations, Fantom cleans after itself by running two batch scripts wiping all the installation files clean.

Ransomware isn’t new, but the ways that cybercriminals utilize them are. Who would’ve thought that the ever so familiar Windows Update window has fallen prey to malicious intent? Pretend that you’re the Little Red Riding Hood and that the wolf is the ransomware that cybercriminals have disguised as your grandmother. They no longer wait to trap you, instead, they wait for you to walk straight into one instead.

The issue of ransomware is as extensive as it is meticulous. If you have any questions about Fantom or would like to request more information, feel free to get in touch with us! Give us a call or send us an email. Our dedicated staff are more than happy to help.

Published with permission from TechAdvisory.org. Source.

Read More