Office 365 allows guests to collaborate



Office 365 is constantly evolving. What started as an online extension of Microsoft’s flagship productivity suite has evolved into one of the best pieces of cloud software currently on the market. Last month we saw the next stage in that evolution, and it came in the form of allowing guests to collaborate on your 365 projects. Interested? We thought you’d be, so let’s take a closer look.

This new functionality mainly centers around Office 365 groups. A 365 group is essentially an email address with Office privileges that several people have access to. For example, if you have an Editorial Group, each individual writer at your organization will receive emails, calendar invites, and document read/edit privileges sent to

If you’re interested in adding a guest from outside of your organization to an Office 365 group, the process is simple. From the group administration dashboard, click “Add Members.” Then, all you need to do is enter the email addresses of whomever you would like to add, and voilà.

Guest collaborators will receive an email alerting them of their new addition and access to group files, emails, and calendar items — all accessible via Office on the web.

Take note, however, of Outlook’s alert: “You’re adding a guest to this group. As a member, they’ll have access to group content.” This will grant new guests all the same read/edit privileges as other group members — including privileges from before the guest was added.

There is no requirement for guests to have a Microsoft account, and by always labeling the new member as a guest, original group members won’t ever have to worry about forgetting who should receive confidential document privileges.

Unless the guest is a trusted partner, we recommend creating 365 groups specially designated for the purpose of outside collaboration to ensure the privacy of your cloud documents. Administrators can remove them at any time, or guests can volunteer to leave on their own.

Adding and removing collaborators from outside of your organization may be as simple as adding an email address to a list, but the possibility for improved teamwork is limitless. If at any point in your workflow you feel that your work is suffering from bottlenecks in creation, communication, or collaboration, there’s a good chance Office 365 has a solution. If there’s anyone who will know that solution, it’s us. Message us today about collaborating on all your productivity dilemmas.

Posted in Uncategorized | Leave a comment

Apple boosts iPad storage and drops prices



Although no announcements have yet been made, Apple’s flagship tablet is changing. Just like the iPhone, the iPad will get a boost in storage capacity. Up from the previous 16GB, the minimum storage capacity for iPads is now 32GB. Keep reading to find out whether these changes mean it’s time for you to head out and grab a new iPad.

Hoping to lure customers back to their mobile devices, Apple has made a number of changes to its products. However, the changes aren’t as simple as they sound, and there are 21 total variations of iPad model and storage. For instance, the storage capacity of the iPad mini 2, the oldest and cheapest version, has been upgraded from 16GB to 32GB.

Both the new Wi-Fi and cellular models of the iPad Air 2 and iPad mini 4 share the same price, and come in either 32GB or 128GB. These are the only two storage options available for these models as the mid-range 64GB model has been discontinued. While the mini 4 kept all its prices the same and simply added more storage, the Air 2 received increased storage capacity and price reductions as high as $200 for the largest model.

Previously, those looking to purchase high-end 12.9-inch iPad Pros had to shell out over a thousand dollars. But if you’re willing to stick to a Wi-Fi model, that’s no longer the case with the 256GB version coming in at $999. Cellular-enabled iPad Pros won’t offer a 32GB model, which means the cheapest option will cost you over a grand.

The 9.7-inch iPad Pro offers the most variety in available storage, with 32GB, 128GB, and 256GB models for both the Wi-Fi and cellular versions of the tablet. Not excepted from price cuts, these models saw price reductions across each of the six configurations, which now cost anywhere from $599 to $929.

Originating in 1965, Moore’s Law states that the number of transistors in a circuit doubles every two years. This standard has held true even for digital storage, which has grown exponentially. However, what Moore’s Law doesn’t approximate is price. Yet again, consumers have the opportunity to purchasegreater computing power at lower prices.

Apple manufactures a lot more than just iPhones and iPads. As specialists in everything that runs iOS and MacOS, we’re your one-stop shop for all your Apple technology needs. Whether it’s hardware advice or Mac-only software solutions, we’re here to help. Give us a call today to find out how we can improve your Apple technology.

Posted in Uncategorized | Leave a comment

VMware’s Project Goldilocks: what is it?



Almost every day, the virtualization industry takes a giant leap forward. Although this industry has been reserved for only the most technologically advanced of businesses over the years, it’s spreading like wildfire with advances in cloud computing. As engineers create virtual versions of hardware, storage, and even networks, digital architects are coming up with entirely new ways to design your IT framework. Today’s development comes in endpoint security, and we’ve got everything you need to know right here.

A virtual network is a way to connect two or more devices that aren’t physically linked by wires or cables. From the perspective of machines on a virtual network, they’re essentially sitting in the same room — even if they’re on opposite sides of the globe. The advantages of this setup range from ease of management to reduced hardware costs. AT&T and Verizon have begun offering these services, and small- and medium-sized businesses have slowly begun to adopt them.

Meanwhile, another sector of the IT world has been making its own advances. Cutting-edge hardware firewalls are beginning to offer internal segmentation as a method of separating pieces of your internal network to keep them safe from threats that spread internally. The more segments you have, the safer your network is from poorly protected neighbors. But there are limits to how much capacity one of these hardware firewalls has for segmentation.

Virtualization giant VMware has taken notice and developed a prototype to combine these two services. In the hopes of unleashing ‘microsegmentation’ from the limits of physical hardware, Project Goldilocks will essentially create a virtual firewall for every virtualized application. When one of these applications is created or installed, it will come with a ‘birth certificate’ outlining everyacceptable function it can perform. When making requests to the operating system, network, or hardware the application is installed on, Goldilocks will cross-reference the request with the birth certificate and deny anything that hasn’t been given permission.

Segmenting virtual networks and applying them to individual applications rather than entire networks or operating systems could revolutionize the market for endpoint security. Not only would it be easier to block malware infections, but those that made it through could be quarantined and terminated immediately because of the virtual nature of their location.

While virtualization may be a complicated state-of-the-art technology, all it really takes is a helping hand. With our full team of specialists, we’re ready to pull you into the next stage of your virtualized infrastructure. All you need to do is reach out us — why not do it today?

Posted in Uncategorized | Leave a comment

Tame Windows 10 notifications in 3 steps



Microsoft has equipped Windows 10 users with a comprehensive set of tools to get their action center settings under control — even if most users don’t know it. Unfortunately, most desktops are coming with more software and features that result in more notifications, without ever providing users the opportunity to personalize their desktop and get the stream of information under control. If you’ve reached the point of oversaturation, we’ve got all the information you need to manage your action center right here.

Overarching action center settings

The place to start is customizing system-wide notifications settings. To view these, click on the Cortana icon on your taskbar, type ‘Notifications,’ and click ‘Notifications & actions settings.’ From here you can turn off alerts entirely, adjust those on the lock screen, or customize the alerts for core functions such as alarms and incoming calls.

Settings for individual applications

If you’re interested in taking a far more nuanced approach to your notifications, there are options to create rules on an app-by-app basis. At the bottom of the ‘Notifications & actions settings’ screen is a section titled ‘Get notifications from these senders.’ At first glance it may look as though you can only turn alerts completely off or on for these apps, but that’s not the case.

By clicking on any of the items in this list, you can open a new window full of more graded notifications options. From here, users can specify lock screen, sound, and priority settings for individual software.

Closing the blinds

For users who have no interest whatsoever in the Windows 10 action center, there is a way to banish it entirely. Open Cortana again and search ‘Notification area.’ Halfway down the page, click the menu titled ‘Turn system icons on or off.’ Toggling the Action Center option (third from the bottom) allows you to remove the icon from your taskbar altogether.

While you’re at it, why not take this philosophy one step further? Click the back arrow to return to the ‘Notification area’ window and this time choose ‘Select which icons appear on the taskbar.’ Here you can choose which apps to remove from your taskbar entirely, eliminating any annoying icons that change to alert you of distracting notifications.

Everyone is different. If artists have tools unique to their style, why shouldn’t the tools of your trade be tailored to your preferences? Our paintbrush is technology, and we’d love to show you how we work by helping you achieve new levels of productivity and efficiency on your Windows machine. Get in touch with us today to speak with one of our tech-savvy specialists about your technology goals.

Posted in Uncategorized | Leave a comment

9 cybersecurity terms everyone must know

2016September21_Security_C (1)


Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.


For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.


Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.


Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value — always verify the source of any service requesting your sensitive data.


Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.


When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Posted in Uncategorized | Leave a comment

What can we learn from Delta’s IT outage?



Companies can pay a hefty sum if they ever experience any downtime. In fact, Delta Air Lines had a bad bout of severe downtime just last month. In just three days, the airline company cancelled 2300 scheduled flights and suffered $150 million in income loss. That doesn’t even account for the considerable reputational damage from delayed service. So how do you avoid sharing the same, expensive fate? Here are some valuable business continuity lessons we can all learn from Delta’s IT outage.

Strive for 100% redundancy
According to Delta’s chief information officer, a power failure caused the company’s data center to crash, grounding thousands of would-be passengers. Although power was restored six hours after the incident, critical systems and network equipment failed to switch to a secondary site, corrupting valuable data in the process. And while some systems failed over, other vital applications didn’t; this created bottlenecks, decreased revenue, and diminished customers’ confidence.

Delta’s case is a massive wakeup call not just for the airline industry but for every business — large and small. Companies must implement disaster recovery plans for their data centers, on-site technology, and Cloud applications to continue servicing customers while fixing the main issue with their primary systems. Companies also need to get rid of the false notion that redundancy plans to assure service continuity is restricted to larger corporations. DR and business continuity solutions are extremely affordable today, and a partnership with a provider can help you in more ways than one (more on this later).

Always test your backups

So although Delta had a plan to bring its business back to normalcy, the DR plan left a lot to be desired in practice. This begs the question as to whether the airline company is actually testing, reviewing, and reinforcing its vulnerabilities to different disasters.

The point is that even though your company may have a failover protocol in place, that protocol adds no value to your business unless it has been rigorously tried and tested. In order to avoid the same fate as Delta, make sure to find out whether your disaster recovery plan is capable of running mission-critical applications like email and customer service applications before — not after — downtime occurs.

Account for different types of vulnerability

In an interview with the Associated Press, Delta CEO Ed Bastian said, “We did not believe, by any means, that we had this type of vulnerability.” Indeed, it’s often hard to foresee what threats and vulnerabilities a natural disaster, power outage, or hacker can produce. But it’s not impossible.

By conducting a comprehensive audit of your data center security and disaster protocols, your business will be more aware and adept at minimizing the risk of potential disasters. This also means evaluating and preparing for disasters that are likely to happen to your business depending on its geographic location. Southern US, for instance, is prone to hurricanes and flooding.

Call for help

These lessons and strategies are all crucially important, but pulling off a DR and business continuity solution on your own may be difficult. For this reason, it’s critical to have a planned partnership with a managed services provider that can assess, plan, test and install the continuity solutions your business needs in order to minimize the impact and avoid encountering a Delta IT outage of your own.

To find out more about business continuity and guaranteeing complete IT redundancy, contact us today.

Posted in Uncategorized | Leave a comment

6 advanced search tips for Gmail



Looking for an important file or message among endless emails in your inbox is no fun, especially if you need it right before a meeting starts. You’ve tried using the basic search box at the top of Gmail and found out that it didn’t help either. Don’t worry, we’ve rounded up 6 search operators that will help you sort through your inbox to get what you need in a jiffy.

1. Where did I put that file?

Looking for a file your colleagues sent you ages ago? Don’t remember the file’s specific name but you do recall some keywords? That’s a good start. Simply type a keyword after filename: to search for a particular file. For example, you can typefilename: minutes to search for a file named meeting minutes. Don’t even remember a part of the name but know what type of file it is? Then you can also use the same search operator to search for a file type. For example, typefilename: doc to search for document files.

2. CC or BCC

There are times when you want to narrow down the recipients: whether they are direct, carbon copy (cc), or blind carbon copy (bcc) receivers. The basic “To” search boxes are proven to be useless in this case. What you can do to be more specific is to type cc: or bcc: followed by the recipients’ names or email addresses. For example, instead of typing “anna” in the “To” search box, you can type cc: anna to look for email sent to Anna as a carbon copy (cc) only. Note that you won’t be able to find messages that you received on bcc.

3. Search by time period

You don’t have to remember the exact dates to be able to search for a specific email. With the search operators before: or after:, you can just type the period when the email is sent or received. Don’t forget to use the date format yyyy/mm/dd, otherwise, Gmail wouldn’t get it. By typing after: 2016/07/01before: 2016/07/15, Gmail will look for emails sent or received between July 1, 2016 and July 15, 2016.

4. Search for read, unread, or starred messages

You can search for messages that are read, unread, or starred by using is:read,is:unread, is:starred. By typing is:read is:starred from:Anna you are searching for messages from Anna that have been read and marked with a star. If you have more than one type of stars (or if you don’t, we suggest you learn how to manage your emails with Gmail’s stars option), you can type has:green-star to search for messages marked with that color.

5. Don’t ignore Spam or Trash

Whether using the simple search box or search operators suggested above, both ignore emails that are in Spam or Trash box. And from time to time, important emails can mistakably be thrown into Trash box for some unknown reasons. Usein:anywhere to look everywhere in your inbox, including those two places, to make sure that no important email has slipped through.

6. Look in the chat box too

We all hate it when our colleagues send important files or message via a chat box. That makes it difficult when searching for them later. But by typing is:chatfollowed by keywords or name of the person you’re communicating with, you can actually search for messages or files in the chat log. Next time you can tell your colleagues to send vital files or information via proper email instead. But if that still doesn’t work, now you know how to help yourself.

When it comes to managing and sorting through confidential emails in your inbox, no one can do it besides you. Yet there are still the matters of database management and security to take into consideration. Why not outsource those issues to us and enjoy a more carefree communication with your colleagues and customers? Call us today to see what our experts can do for you.

Posted in Uncategorized | Leave a comment

IRS Warns of Back-to-School Scams; Encourages Students, Parents, Schools to Stay Alert


WASHINGTON — The Internal Revenue Service today warned taxpayers against telephone scammers targeting students and parents during the back-to-school season and demanding payments for non-existent taxes, such as the “Federal Student Tax.”

People should be on the lookout for IRS impersonators calling students and demanding that they wire money immediately to pay a fake “federal student tax.” If the person does not comply, the scammer becomes aggressive and threatens to report the student to the police to be arrested. As schools around the nation prepare to re-open, it is important for taxpayers to be particularly aware of this scheme going after students and parents.

“Although variations of the IRS impersonation scam continue year-round, they tend to peak when scammers find prime opportunities to strike”, said IRS Commissioner John Koskinen. “As students and parents enter the new school year, they should remain alert to bogus calls, including those demanding fake tax payments from students.”

The IRS encourages college and school communities to share this information so that students, parents and their families are aware of these scams.

Scammers are constantly identifying new tactics to carry out their crimes in new and unsuspecting ways. This year, the IRS has seen scammers use a variety of schemes to fool taxpayers into paying money or giving up personal information. Some of these include:

  • Altering the caller ID on incoming phone calls in a “spoofing” attempt to make it seem like the IRS, the local police or another agency is calling
  • Imitating software providers to trick tax professionals–IR-2016-103
  • Demanding fake tax payments using iTunes gift cards–IR-2016-99
  • Soliciting W-2 information from payroll and human resources professionals–IR-2016-34
  • “Verifying” tax return information over the phone–IR-2016-40
  • Pretending to be from the tax preparation industry–IR-2016-28

If you receive an unexpected call from someone claiming to be from the IRS, here are some of the telltale signs to help protect yourself.

The IRS Will Never:

  • Call to demand immediate payment using a specific payment method such as a prepaid debit card, gift card or wire transfer. Generally, the IRS will first mail you a bill if you owe any taxes.
  • Threaten to immediately bring in local police or other law-enforcement groups to have you arrested for not paying.
  • Demand that you pay taxes without giving you the opportunity to question or appeal the amount they say you owe.
  • Ask for credit or debit card numbers over the phone.

If you get a suspicious phone call from someone claiming to be from the IRS and asking for money, here’s what you should do:

  • Do not give out any information. Hang up immediately.
  • Search the web for telephone numbers scammers leave in your voicemail asking you to call back. Some of the phone numbers may be published online and linked to criminal activity.
  • Contact TIGTA to report the call. Use their “IRS Impersonation Scam Reporting” web page or call 800-366-4484.
  • Report it to the Federal Trade Commission. Use the “FTC Complaint Assistant” on Please add “IRS Telephone Scam” in the notes.
  • If you think you might owe taxes, call the IRS directly at 800-829-1040.
Posted in Uncategorized | Leave a comment

Best Options for CRM Software in 2016



As the saying goes, “absence makes the heart grow fonder.” If oceans were to separate you from your loved ones, what would you do? Would you communicate as much as you used to? Would you still check in from time to time? Now, apply this sentiment to your business; what would happen if communication with your customers broke down? Following up on orders or keeping track with progress would become a nightmare – it’s time for CRM software to save the day:

Since every business differs in terms of size, there is no one-size-fits-all when it comes to CRM. Thus, varying corporate sizes require unique CRM software that best addresses requirements. We’ll be taking a look at ideal CRM software options for the following categories: businesses in general, very small businesses and ones that are free.

Best CRM Software for Small Businesses: Salesforce

Salesforce has long been considered one of the top-tier CRM solutions, mainly due to its cloud-based nature coupled with full-featured capabilities that cater to businesses of every size. Typically, Salesforce is synonymous with larger enterprises, but that doesn’t mean small- and medium-sized businesses are denied the same perks. Enter Salesforce’s small business edition: with it, SMBs can utilize the robust set of CRM tools at an affordable rate.

Salesforce Small Business Solutions offer packages that are tailor-made for small businesses. With it you’ll be able to fully utilize all that Salesforce has to offer. In order for your company to really thrive, your CRM should be equipped with features such as lead generation, contact and opportunity management, sales forecasting, workflow automation as well as collaborative tools — all of which can be found in Salesforce. Also, the software is cloud-based, meaning that you can access data and files anywhere at anytime via mobile devices.

Best CRM Software for Very Small Businesses: Insightly

Underneath its simple and navigable facade lies a CRM software that is abundant with capabilities, all of which fit the bill for microbusinesses. Aside from the fact that it has the vital components small businesses really look for in CRM software, it’s also highly scalable to accommodate the growth of your company. Furthermore, Insightly is currently one of the more affordable CRM solutions on the market; there’s even a free version if you wish to test the waters. There are also paid plans available at a fraction of the price when compared with other CRM software solutions.

Even with the free version or paid plans that start at $12, Insightly doesn’t compromise utility with affordability. It comes equipped with all the vital CRM capabilities any microbusiness would need. This includes detailed sales reports, opportunity, contact and project management as well. It’s also scalable to meet the needs of your business as it grows. To top it all off, it’s a cloud-based CRM software allowing you to access data anywhere at anytime via Internet-enabled mobile devices.

Best Free CRM Software: Zoho CRM

Not having to pay for Zoho doesn’t necessarily mean it won’t deliver the necessary capabilities required from CRM software. Zoho CRM provides your business with all the core functions it needs. Moreover, it allows you to onboard up ten users for free. Courtesy of Zoho CRM’s mobile app, you’ll be able be access data regardless of time or location. Here are some of the other features that the free version of Zoho CRM has to offer:

  • 360-view – all the vital information is stored and displayed, allowing you to make the best business decisions. This includes contacts, sale cycles, pipelines, and discover trends. It also helps you identify opportunities.
  • Automation – spend less time dealing with mundane tasks by automating tasks such as lead generation, contact management, calendars and even call logs.
  • Collaboration – Zoho CRM doubles as a social media platform integrating with Twitter and Facebook to link contacts to their social media accounts. This allows you to see their updates as well as the interactions you’ve had on social media right from your dashboard.
  • Analytics – you can track sales as well as measure both business and employee performance via a range of reporting capabilities.
  • Security – with Zoho CRM, you are given full control over who can do what with the software. Besides creating individual user profiles, you can assign roles and even restrict access.

Unlike farms, the main component to a company’s growth isn’t fertilizer and sunshine. Instead, it’s competent CRM software that allows your business to reach its full potential. If you have any questions on customer relationship management software, feel free to get in touch with us. We’re more than happy to not only provide answers but also be part of your success.

Posted in Uncategorized | Leave a comment

Linux bug infecting Android users



Bugs have come a long way, and they’re not just creepy-crawlies anymore. So we have to worry not only about the bugs that we contract and make us physically ill, but also the bugs that threaten the security of our beloved smartphones. Most people overlook bugs since they’re so tiny, but what they lack in size they make up for in their capacity to wreak havoc on innocent devices. What are the consequences of failing to address these security matters? Read on and find out.

Recently, researchers from the mobile security firm Lookout confirmed that “an estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren’t encrypted, inject malicious code or content into the parties’ communications.” The statement itself might be new, but many have already suspected a flaw in version 3.6 of Linux, dating as far back as 2012. It’s thought that the flaw itself was introduced into Android version 4.4 (aka KitKat) and is still present today, including in the latest developer preview, Android Nougat.

As numerically backed up by the Android install base and quoted by statistic provider Statista, over 1.4 billion Android devices (about 80 percent of users) are currently vulnerable. What Android users can do is to ensure that their communications are encrypted by using VPNs (virtual private networks) or by making sure that whatever sites they visit are encrypted. Encryption allows you to travel without being tracked; if the predator can’t see you, you’re no longer a target.

If you’re vulnerable, you welcome anyone with an Internet connection to determine whether or not two parties have been communicating via a long-lived transport protocol connection. This includes Webmail, news feeds as well as direct messages. Unencrypted connections allow attackers to utilize malicious code or inject content into the traffic. This doesn’t mean that encrypted connections are safe; attackers are still be able to determine and terminate the existence of channels as well. This vulnerability has been dubbed as CVE-2016-5696.

One of the more likely methods used to compromise Android users is the the insertion of JavaScript into legitimate Internet traffic that isn’t HTTPS cryptographic scheme-protected. This may display messages claiming that users have been logged out of their accounts and prompting them to re-enter their usernames and passwords. Having sent the login credentials to the attacker, similar exploits may also be used to target unpatched browsers, emails or chat apps the Android users use.

To initiate the attack, the attacker must spend about 10 seconds to establish whether two specific parties are connected, then another 45 seconds to flood their traffic with malicious content. Because it takes a certain amount of time for the attack to fully commence, these attacks aren’t suited for opportunistic attacks that affect more than one individual. Instead, this technique is ideal for the infection or surveillance of one specific target, especially if the hacker knows some of the sites the target frequently visits.

We can breathe a sigh of relief with a Google representative’s statement that company engineers are aware of the situation and are “taking appropriate actions.” He also noted that among the various vulnerabilities on Google’s patches, the Android security team has officially rated the risk as “moderate” as opposed to “high” or “critical.” Maintainers of the Linux kernel have successfully patched CVE-2016-5696. They are working toward incorporating a fix into a new Android release in the coming months.

Matters of security should never be taken lightly, especially when it comes to your personal device. For more information on this sensitive and intricate matter, please feel free to contact us anytime. We are more than happy to answer your questions. The more you know, the better.

Posted in Uncategorized | Leave a comment