New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world’s most widely used mobile operating system, Android. What’s more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers,…

What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?

Some of the most commonly asked questionsI asked are around tradational on premise Active Directory and Azure AD services and the differences between all the flavours available to them when adopting a hybrid posture. More specifically, what are the difference between: Azure Active Directory (AAD) Azure Active Directory Domain Services (AADDS) Active Directory (AD) It’s essential to understand…

Sample Internet & Email Usage Policy

As IT consultants we are often asked to assist our clients with Acceptable use Policies.  IT is very unlikely that any two usage policies will be identical, as companies have different requirements, however it helps to have a sample policy to start as a base and then adapt as required.  I have provided very simple…

How to use the Out of Office Assistant in Outlook

Summary This article describes how to use the “Automatic Replies (Out of Office)” and “Out of Office Assistant”. Note This feature is only available with an Exchange account that used by many organizations. Home users typically do not have the Exchange account. To enable Automatic Replies feature for non-Exchange account, please go to this section:…

Multiple Gaming And Photo Apps On Play Store Found to be Infected With Android Malware

Despite back-to-back reports of malicious apps, Google’s Play Store still harbors lots of such applications. Once again, researchers have discovered a bunch of such applications, including gaming and photo apps, that delivered malware to users’ devices. Malicious Gaming and Photo Apps Reportedly, Dr.Web team has discovered another batch of malicious applications flooding the Google Play…

Why Techtron Recomends Microsoft Security

As a trusted IT and Security advisor for our clients, we constantly watch the security and vendor landscape, looking for the latest best practices, threats and updates from our partners.  Identity driven security has become essential in todays online world.  I have highlighted some of the key aspects of Identity driven security, how Microsoft has…

D-Link router models affected by remote code execution issue that will not be fixed

Researchers at Fortinet’s FortiGuard Labs have publicly disclosed a critical remote code execution vulnerability affecting some models of D-Link routers. Security experts at Fortinet’s FortiGuard Labs disclosed a remote code execution vulnerability tracked as CVE-2019-16920. The vulnerability is an unauthenticated command injection issue that was discovered on September 2019. The flaw has received a CVSS v31 base score of 9.8 and a…

How to Fix Windows 10 Update Assistant Vulnerability

Microsoft has released a new version of the Windows 10 Update Assistant in order to fix a local privilege escalation vulnerability. While there is no imminent threat, the only way to fix this vulnerability is to uninstall the program or download the latest version. The Windows 10 Update Assistant is a Microsoft program that helps you…

Windows 7 end of Life

End of Support for Windows 7 is coming on 14 January 2020. That means your business will be vulnerable to malware and bugs, with no fixes on hand. Upgrade to Windows 10 and improve your productivity with a range of new features, designed for the modern workplace. Upgrade to Windows 10 Windows 10 gives your…