A popular plug-in has more than 200 million PC users at risk. Find out how attackers are gaining access to their personal information. Meanwhile, a new exploit is leaving Mac users vulnerable as well! We cover these stories and more on IT Rewind!
IT Rewind Featured Stories:
Did our short segment leave you wanting more? Check out the original articles of stories we covered!
With Continuum's Platform, G2 Enjoys Greater Revenue and Profitability
Continuum's Must-Read Blog Post This Week
It's been quite the 10 years for data breaches, hasn't it? Maybe you've been repressing those awful memories from cybercriminal attacks past. Then again, you might be able to recall the results of 2014's Target and 2008's Heartland data breaches, down to the last stolen record and compromised credential. I want to see how much you know about the decade's worst data security fails. Do you think you can hack it? Play to win in this quiz about data loss!
Then, share this post with your colleagues and on your own websites to show the world of managed IT services just how important data protection is for business longevity...oh and that you're really smart for getting all 10 questions correct, of course! Read More»
What Else Is New in the IT Channel?
Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!
FCC Proposes Internet Subsidy for Low-Income Users
The Wall Street Journal, @, Gautham Nagesh, @
Gartner: AWS Pulls Further Ahead of Others in IaaS Cloud Market
The Whir, @, Jason Verge
IT REWIND IS ON THE ROAD ONCE AGAIN. THIS WEEK, I’M AT THE R1SOFT OFFICE HERE IN HOUSTON, TEXAS TO BRING YOU THE LATEST FROM THE WORLD OF IT. LETS DO THIS THING!
A FLAW IN THE UNITY WEB PLAYER, WHICH IS INSTALLED ON OVER 200 MILLION PC’S, CONTAINS A FLAW THAT LETS ATTACKERS STEAL USER DATA. THE VULNERABLE DATA COMES FROM WEBSITES THAT THE USER HAS LOGGED INTO SUCH AS EMAIL AND SOCIAL MEDIA ACCOUNTS. DEVELOPERS USE UNITY TECHNOLOGY TO CREATE ONLINE GAMES AND 3D CONTENT. ACCORDING TO RESEARCHERS, THERE IS NO PATCH IN PLACE FOR THE VULNERABILITY AT THIS TIME.
MAC USERS BEWARE. ACCORDING TO A RECENT REPORT, MAC SYSTEMS FROM A YEAR AGO AND OLDER ARE VULNERABLE TO EXPLOITS THAT OVERWRITE THE FIRMWARE THAT ALLOW THE MACHINE TO BOOT UP. ONCE EXPLOITED, THE ATTACKER CAN CONTROL THE COMPROMISED DEVICE. THIS ATTACK IS BEING CALLED MORE SERIOUS THAN THE THUNDERSTRIKE PROOF-OF-CONCEPT EXPLOIT OF LAST YEAR. LAST YEAR’S EXPLOIT REQUIRED PHYSICAL ACCESS WHILE THIS MORE RECENT ATTACK DOES NOT.
THIS WEEK ON THE PARTNER SPOTLIGHT WE FOCUS ON JASON GAY OF G2 TECHNOLOGY GROUP. G2 TECHNOLOGY GROUP IS LOCATED IN THE GREATER BOSTON AREA AND PROVIDES A VARIETY OF IT SERVICES TO ITS CLIENTS. RECENTLY, GAY WAS FEATURED IN A CASE STUDY WHERE HE DESCRIBED HIS COMPANY’S RELATIONSHIP WITH CONTINUUM. ACCORDING TO GAY, PARTNERING WITH CONTINUUM HAS LED TO HIGHER REVENUE NUMBERS, GREATER PROFITABILITY AND THE ABILITY TO INVEST MONEY BACK INTO THE BUSINESS. TO SEE THE FULL CASE STUDY ON JASON GAY AND G2 TECHNOLOGY GROUP, SIMPLY CHECK OUT THE LINK BELOW.
THAT’S ALL THE TIME WE HAVE FOR THIS SPECIAL HOUSTON, TEXAS EDITION OF IT REWIND. I’LL BE BACK IN THE BOSTON STUDIOS NEXT WEEK WITH MORE NEWS FROM THE WORLD OF IT. UNTIL THEN, FIND US ON TWITTER, INSTAGRAM AND VINE AT FOLLOWCONTINUUM. YOU CAN ALSO CONNECT WITH US ON FACEBOOK, LINKEDIN, GOOGLE PLUS AND YOUTUBE. TAKE IT EASY.
By Paula Griffin
By Lily Teplow