Blog

Adding Root Certificates to Windows Mobile 2003 Pocket PC

How can I add a Root Certificate to my Windows Mobile 2003 Pocket PC? Windows Mobile 2002 and 2003 based Pocket PCs use Root Certificates to allow access to SSL-enabled applications such as Microsoft Pocket Internet Explorer, Microsoft ActiveSync (when it is configured to synchronize directly with Microsoft Exchange 2003 Server), L2TP-based VPN connections and…

View Article

M365 Changelog: (Updated) Ink Color Picker for Microsoft Whiteboard

MC560720 – Updated August 2, 2023: Microsoft has updated the rollout timeline below. Thank you for your patience. Users will soon be able to enjoy a wide range of colors for inking using the latest color picker feature. In addition to color picker, a slider will also be provided to change opacity level of pens….

View Article

QNAP NAS Devices Being Targeted by Qlocker Ransomware Again

QNAP, a Taiwan-based network-attached storage (NAS) manufacturer, has issued an advisory about ransomware and brute-force attacks that affect all network-attached storage devices. The ransomware attacks began targeting the NAS device suite on January 6, and the company urges customers to secure their compromised devices as soon as possible. “Open the Security Counselor on your QNAP…

View Article
Security

Russian Hackers Exploit Outlook Flaw to Breach Exchange Accounts

Microsoft has warned customers that a Russian state-sponsored hacking group (dubbed Forest Blizzard (STRONTIUM)) is actively exploiting an Outlook flaw to target Exchange Servers. The vulnerability could potentially unlock unauthorized access to emails and pave the way for the pilfering of sensitive information. In March, Microsoft disclosed a critical vulnerability in Outlook for Windows that…

View Article
warning-cyber-attack

Microsoft Says Chinese Hackers Compromised Exchange Email Accounts

Microsoft has disclosed that Chinese hackers breached the email accounts of US government employees. The hacking group (tracked as Storm-0558) exploited a flaw in Microsoft’s cloud email service to gain unauthorized access to email systems. Microsoft found that the threat actors used forged authentication tokens to access affected user accounts through Outlook Web Access in…

View Article

Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers

VPNs are commonly used to give users working from home access to corporate resources. But traditional forced tunnel VPNs can have a significant impact on the performance of cloud services like Office 365. In this article, I look at the different ways VPNs can be configured for performance and security.

View Article

Review: Microsoft’s Surface Go hits the Mark for the First Line Worker

Microsoft’s Surface Go is smaller in every way but does the limited performance impact it’s big picture dreams?

View Article

Intel Wireless Docking and WiGig

Learn about new wireless docking technology from Intel and WiGig.

View Article

Microsoft Connect: Visual Studio 2017, SQL Server v.Next for Windows and Linux and More

Microsoft held its Connect conference today and announced at the event are Visual Studio 2017, SQL Server v.Next for Windows and Linux, Visual Studio for the Mac, and that Microsoft has joined the Linux Foundation as a platinum member.

View Article
Security

New Report Says Hackers Exploiting Spring4Shell Flaw to Spread Mirai Malware

A team of security researchers has discovered that attackers are now exploiting the critical Spring4Shell vulnerability to spread Mirai malware on target systems. The Mirai botnet malware attacks were first detected earlier this month, and the threat actors are currently targetting vulnerable web servers in the Singapore region. According to Trend Micro’s researchers, the threat…

View Article
Go to page