Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

Continue reading
0 Comment

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the file, Petya would get to work.

Continue reading
0 Comment

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

Continue reading
0 Comment

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

Continue reading
0 Comment

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

Continue reading
0 Comment

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Continue reading
0 Comment

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpgThere’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

Continue reading
0 Comment

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

Continue reading
0 Comment

Windows 10 Is Here - Everything Your Business Needs to Know

b2ap3_thumbnail_windows_10.pngMicrosoft’s latest PC operating system arrived with fanfare yesterday, and has received overwhelmingly positive reviews so far, but is it ready for your business? Let’s take it for a spin and find out.

Continue reading
0 Comment

Windows Server 2003 End of Support Date Looms on the Horizon

b2ap3_thumbnail_windows_logo_400.jpgThe next major operating system to get the ax from Microsoft is Windows Server 2003. Slated to have its mainstream support ended on July 14th, businesses that currently use the software need to begin making plans to upgrade their system as soon as possible. With this server operating system no longer being supported by Microsoft, your data will be vulnerable to the latest online threats.

Continue reading
0 Comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Google Network Security Hackers Malware Data Microsoft Innovation User Tips Business Software Hardware Email Smartphones Miscellaneous Communication Hosted Solutions Backup Workplace Tips communications Mobile Devices Internet Computer Android Small Business IT Support Smartphone Cybersecurity VoIP Ransomware Productivity Business Management Social Media Outsourced IT Windows 10 Users Collaboration Mobile Device Upgrade Managed IT Services Browser Windows Network Passwords Tech Term Microsoft Office Business Continuity Holiday Automation Apps IT Services Cloud Computing Bandwidth Windows 10 Employer-Employee Relationship Save Money Office Phishing Facebook Managed IT Services Quick Tips Gadgets Managed Service Marketing Internet of Things Chrome Data Backup Wi-Fi Covid-19 Disaster Recovery Wireless IT Support Apple Health Gmail Saving Money Information Mobile Device Management Networking Server Data Recovery Router Analytics Alert Password Applications Office 365 Mobility Business Intelligence App Cybercrime Managed Service Provider Computers VPN Office Tips Data Breach Remote Computing Hacking Settings Virtualization Access Control Retail Going Green Operating System Twitter Laptop Physical Security Patch Management Blockchain Remote Monitoring BDR Recovery Remote Work Government Excel Law Enforcement BYOD iPhone Application Battery Data Management Website Biometrics History Printer Mouse Humor Conferencing Employee-Employer Relationship Google Drive Mobile Computing Workers Safety Compliance Word Paperless Office Politics Entertainment Environment VoIP Voice over Internet Protocol WiFi Maintenance Big Data Value Managed IT Service Artificial Intelligence Lithium-ion battery Virus Spam Bring Your Own Device Telephone Systems Social Engineering Meetings Education DDoS Robot Remote Monitoring and Management Hard Drives Tech Support IT solutions Telephone System RAM Customer Relationship Management Wireless Charging Shadow IT Dark Web Risk Management Printer Server HIPAA Customer Service Hybrid Cloud Managing Stress Internet Exlporer Processor Tip of the week Healthcare Company Culture Content Filtering Streaming Media Fax Server The Internet of Things Sports Virtual Assistant Cost Management Data Protection Net Neutrality Data Security G Suite Encryption Two-factor Authentication Information Technology How To Tech Terms Social Network Medical IT Connectivity Scam eWaste Smart Technology Batteries Business Technology User Error Best Practice Vulnerability Files Virtual Reality Cortana Data storage Telephony Shortcut End of Support Tablet Payment Cards PowerPoint Current Events Search Mobile Office Remote Windows 7 Hosted Solution Human Resources Cleaning Training HaaS Unified Communications Remote Workers Best Available Digital Cameras Scams News Staff Comparison Time Management Copy Spotify Customer Internet Explorer Co-Managed IT Online Shopping National Security Authentication Private Cloud Personal Information Security Cameras Flexibility Edge Project Management Websites Specifications Distributed Denial of Service Chrome OS Paste Cabling Analysis Public Cloud Memory Threat Memes WIndows 7 Unified Threat Management Updates Botnet Budget Authorization SaaS Wearables Legal Microsoft Teams Management Touchpad Insurance File Management Dongle Windows Media Player Printing IT Lead Generation Managed IT Troubleshooting Remote Support Hiring/Firing Programming Remote Working IT budget Managed Services Provider Electronic Health Records Remote Control Windows XP Relocation PDF Paper Hosted Desktop Display Update SharePoint Staffing Video Games IT Management Vendor Technology Tips User Tip Employees Spam Blocking Reporting Analyitcs Ink Firewall Phone System WannaCry Benchmarks Outlook File Sharing E-Commerce Cables PCI DSS Black Market User Backup and Disaster Recovery Telecommuting Notifications Solid State Drive Email Management Webcam Hacker Profiles YouTube Hard Drive Recycling Profitability User Security Worker Payment Alerts Regulations Compliance Network Attached Storage Distribution SSD Millennials Hard Disk Drive GDPR Science disposal Eliminating Downtime Downloads Computer Repair NarrowBand Processors Licensing instant Messaging Gadget Work/Life Balance Innovations Downtime Bluetooth Server Management Fleet Management Inventory Video Avoiding Downtime Storage Windows 8 Wireless Internet Trends IT Service Wireless Technology Spyware Bitcoin Travel Automobile Wearable Technology Vulnerabilities Social Amazon USB Machine Learning Multi-Factor Authentication Mobile Security OneNote Error People Help Desk Bloatware A.I. Mobile Chromecast HP Live Streaming Sales Access Running Cable Cryptocurrency Plug-In Monitor Telecommute Database Holidays e-waste Voice over IP Uninterrupted Power Supply Windows Server 2008 R2 Multi-Factor Security Touchscreen Internet exploMicrosoft Certification Techology Entrepreneur Movies Consultant Document Management Computer Accessories Threats WhatsApp Antivirus Knowledge Printers Social Networking Proactive IT Reputation Data loss Tablets Tactics Virtual Private Network eCommerce Taskbar Google Maps Microsoft Office 365 Advertising