In early March, the cloud computing company, Citrix received an advisory from the FBI that “they had reason to believe that international cyber criminals gained access to the internal Citrix network.” 1 A forensic investigation determined that hackers had likely used a brute-force technique called password spraying to gain access. Citrix confirmed that hackers had […]

Read More →

Starting July 1, 2019, Vivio will begin offering monthly software leasing for SmarterTools products. You’ll now be able to lease the latest Pro or Enterprise versions of SmarterMail, SmarterTrack, or SmarterStats on a month-to-month basis. The full suite of SmarterTools software add-ons to accompany this software are also available for lease. This convenient monthly lease […]

Read More →

On June 5, vulnerability CVE-2019-10149, nicknamed, Return of the WIZard, was discovered. The current numbers suggest this vulnerability affects more than 3.5 million Linux Exim mail servers worldwide. Linux Exim servers account for almost 57% of the Internet’s email servers. This vulnerability is a considerable risk to businesses and organizations. On June 9, reports came […]

Read More →

Project Gunman In 1984, a covert NSA operation called Project Gunman quietly swapped out eleven tons of communication equipment from the US embassy in Moscow. President Reagan had quickly authorized the creation of Project Gunman after receiving information from France about a surveillance device they’d discovered while repairing one of the teleprinters from their embassy […]

Read More →

Spyware is a form of malicious software (malware) that purposely disguises its presence so that it can collect sensitive information from a computer system. Historically, spyware has been distributed using a wide net, trying to bait anyone and everyone that it can. However, in the last year, there has been a significant shift in focus […]

Read More →

Adware has a conflicted history. A general description of the term is software that automatically generates and displays advertisements. These delivered advertisements then create revenue to cover expenses for the developer. Using ads to generate income for free software or applications is a very successful business model for many companies. The distinction between this legitimate […]

Read More →

We’ve had our eye on a story that’s been dominating the tech news headlines this week. On Tuesday, security researchers announced the identification of four new attacks that are capable of leaking sensitive data from Intel processors. This vulnerability exists in all the Intel chips that have been made since 2011, affecting a large number […]

Read More →

Vivio technicians have discovered a compatibility issue prompted by a recent automatic update from Lucee. Update 5.3.1.95 is bundled with MySQL Connector/NET 8.0.x (com.mysql.cj-8.0.15.jar) that is incompatible with MySQL versions 5.1 and older. If you’re set up to receive this update automatically and running versions of MySQL 5.1 or older, this could potentially break your […]

Read More →

Adobe has released an urgent update for a critical vulnerability in ColdFusion 2018, 2016 and 11. These updates have been given the highest priority rating and should be installed as soon as possible. According to Adobe, “This attack requires the ability to upload executable code to a web-accessible directory, and then execute that code via […]

Read More →