DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing User Tips Google Hackers Microsoft Tech Term Hosted Solutions Software Backup Malware Internet Business Mobile Devices Data Backup Hardware Data Innovation Smartphones Email Small Business Smartphone Communications Android Business Continuity VoIP Data Recovery Workplace Tips IT Services Computer Router Managed IT Services Cloud Computing Disaster Recovery Ransomware Communication Cybersecurity Browser Alert Windows 10 Outsourced IT Chrome Cybercrime Law Enforcement Windows 10 Artificial Intelligence Productivity Network IT Support Office 365 Server Internet of Things Business Management Money Collaboration Efficiency Windows Computers How To Password Miscellaneous Applications Information Holiday Gadgets Spam BDR Managed IT Services Saving Money Wi-Fi Social Media Telephone Systems Productivity Word Facebook Virtualization Mobile Device Passwords Office Flexibility Apps Vulnerability Two-factor Authentication Connectivity Managed Service Data Protection Operating System Mobility Settings Government App Mobile Device Management Avoiding Downtime Social Engineering Work/Life Balance Phishing Quick Tips Data Security Microsoft Office Keyboard Save Money Voice over Internet Protocol BYOD Upgrade Private Cloud Botnet VPN Paperless Office End of Support Remote Computing Telephony Business Intelligence Unsupported Software Windows 7 Managed IT Fraud Access Control Update Public Cloud Machine Learning Office Tips Virtual Assistant CES Data Storage Bring Your Own Device Telephone System OneNote Data Management Redundancy Content Management Employer-Employee Relationship IT Management Data Breach Legal Google Docs Software as a Service Sports Automation Comparison Blockchain HaaS Google Drive Bandwidth Spam Blocking Website Identity Theft Infrastructure Entertainment Encryption Health Networking Human Resources IT Plan Scam Remote Monitoring Servers Password Manager Electronic Medical Records Root Cause Analysis Title II Value Search Engine Virtual Reality HBO Safe Mode IBM FENG Staff Experience Cache Charger Warranty Conferencing Wireless Charging iPhone Techology Hacking HIPAA Wiring Marketing IT Consultant Cast HVAC Vendor Outlook Business Mangement Online Accountants Bing Worker Commute Supercomputer Internet exploMicrosoft Scalability Skype Millennials Wireless Internet Cleaning Printer Battery Emails Software Tips Cortana Automobile Solid State Drive Flash Multi-Factor Security Budget Devices Unified Threat Management Wireless Black Market Leadership Amazon Authentication Enterprise Content Management Display Frequently Asked Questions WiFi Gmail Hiring/Firing MSP Users Hybrid Cloud Search Meetings Telecommuting YouTube Help Desk Content Start Menu Workforce Digital Signature Music Wire Computer Care Mouse Education Travel Google Apps Audit Trending Thought Leadership Mobile Computing Amazon Web Services Nanotechnology Password Management Security Cameras Document Management Excel Recycling Risk Management File Sharing Information Technology How to Remote Work Practices Firewall Company Culture Workers Audiobook Tools Net Neutrality PDF Wearable Technology Administrator Computing Infrastructure Physical Security Video Games Computer Fan Sync Training Camera Online Shopping Smart Tech Patch Management NIST Hacker Best Practice Tip of the week eWaste Politics Augmented Reality Recovery Knowledge Data loss Hosted Computing Managing Stress Shortcuts Current Events Advertising Instant Messaging Downtime FCC USB Smart Office Samsung Microchip History Netflix Internet Exlporer The Internet of Things Specifications Addiction IT Support webinar Evernote Cryptocurrency Windows 10s Windows Server 2008 Criminal Remote Worker Network Congestion Screen Mirroring Credit Cards Inventory Big Data Social Apple Troubleshooting Transportation Wireless Technology Books Public Computer Loyalty Safety Benefits Managed Service Provider Worker Business Owner Hosted Solution SaaS Smart Technology Webinar Rootkit Emergency Employer Employee Relationship Two Factor Authentication Compliance CrashOverride IT solutions Twitter Save Time Computer Accessories Content Filtering Assessment Regulation Smartwatch Vendor Management Printers Bluetooth Shadow IT Television