CTTS, Inc.

Blog

Tech Tip #57: Protect Your Business From Cryptojacking

What is Cryptojacking? Cryptojacking is a new-comer in the world of digital threats, and is the term that is being used to ...

Inappropriate Ads Found In Some Game Apps for Kids

Normally, Google's robust series of checks and audits are pretty good at catching malicious code and preventing it from making its way to the Play Store.  Sometimes, however, something slips through ...

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. ...

Do Not Use These Chrome Extensions

Do you use any of the following Chrome browser extensions? Change HTTP Request Header Nyoogle - (a custom logo for Google) Stickies - (a Post-It note for Chrome) Lite Bookmarks If ...

Backdoor In Certain Lenovo Switches Discovered

Does your company utilize either RackSwitch or BladeCenter networking switches?  Are those switches running ENOS (the Enterprise Network Operating System)?  If so, there's a backdoor in your network you weren't aware ...

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study ...

Vulnerabilities Found In Some GPS Services

A duo of researchers stumbled across a series of vulnerabilities in literally hundreds of GPS services that leave sensitive GPS tracking data open to hackers.  Dubbed "Trackmageddon" by the researchers, the ...

Electronic Device Search Rules Better Defined By US Customs

There's a constant tug of war playing out on the national stage.  On one side, privacy advocates are pushing for greater autonomy for end users, and hard limits to the types ...

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just ...

New Wifi Standard WPA3 May Be Coming

Remember the KRACK WiFi (WPA2) vulnerability, discovered by Mathy Vanhoef?  It turns out that his discovery was a catalyst for action.  Recently, the WiFi Alliance, which is the industry's standards organization, ...

Contact

CTTS, Inc.
  • 557 S. Interstate 35
    Suite 201
    Georgetown, TX 78626
  • Phone: (512) 388-5559
  • Phone: (512) 388-5559

Technology Tips

Protect your business from the latest threats with our weekly Tech Tip Tuesday articles, written by our own Team of experts!

Sign Me Up!