Whether you’re moving to a new location or looking to consolidate the setup in your current home or business, our Team has the knowledge & expertise to provide you with the best network environment to fulfill all of your needs. Ranging from businesses with...
If your company has a Voice over IP network in place, Beacon can get you connected to the rest of the world. Our SIP routers will route calls over the Internet when possible, as well as directly to the PSTN. We can provide both International SIP termination services,...
Article Courtesy of CNETInstead of keeping a potential hacking resource to itself, the US National Security Agency alerted Microsoft to a serious security flaw in the Windows 10 operating system that could open computers to major breaches or surveillance. The NSA said...
Windows Insider Program participants will now be able to view and manage their Microsoft accounts via a newly released, diagnostics-based privacy dashboard. Dubbed “The Windows Diagnostic Data Viewer,” the new dashboard (which is still in beta)...
April 16, 2018 As RSA 2018 kicks off in San Francisco, Cyber Defense Magazine announced today that IT security leader ESET is taking home two of their annual InfoSec Awards. ESET was the sole winner in the InfoSec Research category, and one of the winners in the Best...
W32/Autorun.worm.aaeb-h is an evolved, virtual machine-aware AutoRun worm that makes use of obfuscation and polymorphic techniques in order to evade detection and infect removable media and mounted network shares, according to McAfee. Researchers have seen an increase...
Users of the popular Joomla content management system are being urged by security experts to upgrade to the latest version after reports of exploits being used to compromise websites built on the platform. The SANS Internet Storm Center received numerous reports that...
A new Linux rootkit has emerged and researchers who have analyzed its code and operation say that the malware appears to be a custom-written tool designed to inject iframes into Web sites and drive traffic to malicious sites for drive-by download attacks. The rootkit...
A new piece of malware known as Shamoon that has the ability to destroy files on infected machines and overwrite the master boot record has researchers scratching their heads, wondering what the tool’s purpose might be and why the attackers behind it would...
YouTube launches new face-blurring feature to disguise identities Google (GOOG) on Wednesday announced a new face-blurring tool for its video-sharing website YouTube. The site is the first to roll out such a feature, which is meant to protect the identity of...