SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page

Why Not Use Email Encryption?

by Joseph Forbes | Jun 14, 2016 | Blog Entry, Emailed, INTERNET, PRIVACY, SECURITY, TECHNOLOGY, Web Hosting

Email is here to stay Despite the growing popularity of applications like WhatsApp, email is still considered to be the most important communication tool for online workers 1and is likely to grow in importance over the next five years2. A problem with email however is...
Where is my Product Key?

Where is my Product Key?

by Joseph Forbes | Jun 8, 2016 | Blog Entry, EDUCATION, Microsoft Security Response Center, SOFTWARE, Technical Support, Technicals, TECHNOLOGY

The product key is a usually unique, alphanumeric code of any length required by many software programs during installation. Product keys are also sometimes called CD keys, key codes, product codes, or installation keys. Most software, including some operating systems...
How to protect your computer against dangerous Java Applets

How to protect your computer against dangerous Java Applets

by Joseph Forbes | Apr 18, 2013 | Microsoft's Malware Protection Center

  Java exploits represent a common attack vector used by the bad guys to infiltrate vulnerable computers via the web browser. We wrote about the rise of Java exploits as early as 2010, and we haven’t seen that trend decline. In fact, in the first quarter of...

Microsoft Security Intelligence Report Volume 14 released today

by Joseph Forbes | Apr 18, 2013 | Microsoft's Malware Protection Center

This morning, we released Volume 14 of the Microsoft Security Intelligence Report (SIRv14). This new report studies our findings on trends in the threat landscape based on data from more than 1 billion systems worldwide, focusing on data collected in the second half...

Nevermind Nenim’s hidden agenda – we still caught it

by Joseph Forbes | Apr 16, 2013 | Malware Reports, Microsoft's Malware Protection Center, SOFTWARE, Technicals

from Microsoft® Malware Protection Center by msft-mmpc We recently came across an interesting threat that we detect as TrojanDownloader:Win32/Nemim.gen!A. This particular malware is a trojan downloader, and is capable of deleting its downloaded component files in a...

Social Media Widget for WordPress a source of spam

by Joseph Forbes | Apr 15, 2013 | Cloud Apps, DATA, INTERNET, Internet Scam Notices, SECURITY, Web Hosting

Researchers at Sucuri have found that version 4.0 of the WordPress Social Media Widget, also referred to as social-media-widget, has been injecting spam advertisements into sites. It is recommended that anyone using the widget, which has over 900,000 users, remove or...
« Older Entries
Next Entries »

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy