by admnid | Aug 29, 2022 | ATC Tech Blog
The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They are all connected to your home network, and they all make vast...
by admnid | Aug 29, 2022 | ATC Tech Blog
Does your company use Microsoft 365? If so, and you’ve noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the culprit. Unfortunately, the bug was introduced in the Enterprise...
by admnid | Aug 29, 2022 | ATC Tech Blog
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system. The issues are tracked as CVE-2022-1890, CVE-2022-1891,...
by admnid | Aug 29, 2022 | ATC Tech Blog
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There’s a way that a determined attacker could bypass sandbox restrictions and execute...
by admnid | Aug 29, 2022 | ATC Tech Blog
Do you have the Kali Linux distribution running on one of the machines you own? If you’re not sure what that is, then you almost certainly don’t. Kali is a Linux distro used mostly by “ethical hackers” who use it mainly to perform security...