The infamous Windows support scams are now targeting Macs and the nonprofit that calls itself “Let’s Encrypt” reached a big milestone in its goal for universal HTTPS. To hear more, just click play!

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Support Scams That Plagued Windows Users for Years Now Target Mac Customers

Ars Technica, @arstechnica, Dan Goodin, 

With Goal of Universal HTTPS, Let's Encrypt Reaches Important Milestone

Ars Technica, @arstechnicaDan Goodin, 

Network Time Protocol Flaws Defy HTTPS, Cause Network Chaos

ZDNet, @ZDNet, Charlie Osborne, @ZDNetCharlie

Microsoft Support Scam Recording Exposes Larger Trend of Social Engineering

MSPblog, @FollowContinuum
, Mary McCoy, @MKMcCoy2013

Continuum's Must-Read Blog Post This Week

Outatime: The Tech of Back to the Future Part II

Where we’re going, we don’t need roads.

Twenty-six years ago, I was shown a vision of the future, and it was amazing. At the tender age of 9, I looked at a world that was all neon and new and instantly found it wild, alien and exciting, and yet at the same time approachable, familiar and livable.

Of course, I’m talking about the seminal film Back to the Future Part II.

There are concepts, inventions, and actual products that exist in 2015 only because they were conceived for use in this movie. No, I don’t mean Jaws 19 (although holograms, giant public video screens and incessant sequels are certainly things of today)—I mean things like this, or even this. Heck, even the Cubs are vying for the World Series as we speak, just as predicted. In that way, the movie stands alone as a work of life imitating art imitating the future imitating now. This is heavy.

So we don’t have flying cars, self-lacing shoes or double neckties, but here’s some tech we absolutely have today. Read More»

What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

High school hacker:

         Teen Who Hacked CIA Director's Email Tells How He Did It
         WIRED, @WIRED, Kim Zetter, @KimZetter

Hijacking cameras:

       Attackers Hijack CCTV Cameras and Network-Attached Storage Devices to Launch DDoS Attacks
       CIO, @CIOonline, Lucian Constantin, @lconstantin

That's a big deal:

         Google Joins Yahoo, AOL in Adopting Stricter Email Authentication
         eWeek, @eWEEKNews, Jaikumar Vijayan, @jaivijayan



Hey there everyone welcome back to our Boston studio for another edition of IT Rewind! The infamous Windows support scams are now targeting Macs and the nonprofit that calls itself “Let’s Encrypt” reached a big milestone in its goal for universal HTTPS. Learn more on this week’s episode of IT Rewind!

By now, you’ve probably all heard about the Microsoft tech support scam. If you haven’t you can read more about it by checking out the below link, but in short, a hacker will call claiming to be a Microsoft tech support agent and uses social engineering to obtain control of the computer and install malware. Anyways, researchers at Malwarebytes have recently uncovered a similar campaign targeted at Apple devices. A pop-up disguised as an official OS notification alerts users that there is an issue with their device and provides a number for them to call. There is also a website that prompts users to share their screen with a technician. The site disguises itself as the official apple support page.

Let’s Encrypt, a nonprofit that aims for universal HTTPS for the web, recently reached a big milestone. All major browsers now trust HTTPS certificates. Let’s Encrypt is backed by the EFF and offers free HTTPS certificates to anyone who owns a domain name. HTTPS secures websites in two ways; it encrypts communications between visitors and web servers and it proves that a server belongs to the person or organization that controls it. This service is scheduled to open to the public on November 16th.

Although HTTPS is more secure than HTTP, it’s not bulletproof. Recently discovered attacks on the Network Time Protocol have been able to defeat HTTPS to cause outages, gain access to encrypted communications or even tamper with Bitcoin transactions. The attacks can bypass HTTPS encryption by getting the computer to accept an expired TLS certificate. 

That’s just about all the time that we have for this week’s episode of IT Rewind, As always, read the full stories that we covered today and other tech stories by clicking on the links below.

Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Spiceworks and YouTube. We’re also new to Periscope, so check us out on there as well.

Take it easy.


Give your clients some Microsoft Office quick tips!