Earlier this month, WordPress released version 4.2.2, which would otherwise be unremarkable were it not that the release contained another critical security update to the software. Last month, WordPress released version 4.2.1, which was also classified as a critical security update. These last two updates address specific vulnerabilities called cross-site scripting vulnerabilities, by which a…
Author: CST
In Response to the Mobile Web- Responsive Web Design
Responsive web design is a direct result of the emergence and widespread adoption of mobile devices for personal computing. Traditionally, the web designer sought to optimize a design for viewing on desktop computers, and that tended be a more straightforward process since desktop computer monitors didn’t drastically vary in width and height. The rise of…
Heartbleed
Heartbleed is a term you may have heard thrown around recently. This article is geared on what you need to know about the issue. Firstly, Heartbleed is not a virus. It does not infect your computer – but it does affect you. While Heartbleed doesn’t cause your computer any usual virus symptoms, like crashing, data…
Cloud Computing: A Greener Option for Business
Cloud computing has garnered a lot of attention in recent years as a green solution for business. The market for global cloud computing will be around $180 billion by the end of 2015, according to a Gartner study. This May, the 9th International Conference on Green, Pervasive and Cloud Computing is being held in China…
Scam Warnings!
There have been a lot of scams going around online recently, some of which seem frighteningly real and are completely fake – designed to scare the average computer user into forking over money to ‘fix’ a ‘problem’. Some recent examples would be: the FBI/ICE Virus, or ‘Microsoft Windows’ technicians actually calling over the phone. These…
3 Security Concerns with Employee’s Personal Smartphones
Nielsen’s recent research study on smartphone penetration reveals that 61 percent of cellphones in the U.S. are smartphones. With a smartphone in the majority’s pocket, there’s a good chance at least some of your employees are using theirs during work hours. This brings a number of troubling questions to light. Security issues abound with personal…
Adobe Products
Adobe has several commonplace programs out that you more than likely already have on your computer. These are primarily Adobe Flash and Adobe Reader. Flash is very prevalent on the Internet, with many websites having Flash components, Flash games or advertisements, and Flash-based tool sets. Reader allows you to open and view PDFs (Portable Document…
Phone Scams Involving Your Computer’s Health
I recently posted on our Facebook page about a recent development in our area of Northern Minnesota – but it’s happening everywhere as well. A client received a phone call from a man claiming that he knew she had a Microsoft Windows computer and that it was on its way to failure – something about…
Windows Live Mail, Connecting to Cold Snap-Provided Email
Connecting To Cold Snap Technology Email via Windows Live Mail This tutorial will teach you how to use Windows Live Mail to connect to CST Email services. While this is focused on setting up Windows Live Mail, some of these elements are similar to other Email client programs, and services. For a details on connecting with…
Mobile Security Breaches: A Historical Snapshot of Mobile Security
Seven percent of U.S. families endure the agony of identity theft, according to the 2013 Montana Department of Administration’s Cyber/Data Information Security FAQ. Primary points of attack include credit card data, online banking information and social security numbers. Easily accessible, unencrypted portable devices remain among the most common points of security breach. Whether from a…