Network & Infrastructure

Network & Infrastructure

Whether you’re moving to a new location or looking to consolidate the setup in your current home or business, our Team has the knowledge & expertise to provide you with the best network environment to fulfill all of your needs. Ranging from businesses with...
VOIP Service

VOIP Service

If your company has a Voice over IP network in place, Beacon can get you connected to the rest of the world. Our SIP routers will route calls over the Internet when possible, as well as directly to the PSTN. We can provide both International SIP termination services,...

How Microsoft’s Windows 10 Privacy Update Could Impact You

  Windows Insider Program participants will now be able to view and manage their Microsoft accounts via a newly released, diagnostics-based privacy dashboard. Dubbed “The Windows Diagnostic Data Viewer,” the new dashboard (which is still in beta)...

ESET wins two Cyber Defense Magazine InfoSec Awards at RSA 2018

April 16, 2018 As RSA 2018 kicks off in San Francisco, Cyber Defense Magazine announced today that IT security leader ESET is taking home two of their annual InfoSec Awards. ESET was the sole winner in the InfoSec Research category, and one of the winners in the Best...

Researchers Uncover Polymorphic AutoRun Worm

W32/Autorun.worm.aaeb-h is an evolved, virtual machine-aware AutoRun worm that makes use of obfuscation and polymorphic techniques in order to evade detection and infect removable media and mounted network shares, according to McAfee. Researchers have seen an increase...

Joomla Sites Hit by IFrame Injection Attacks

Users of the popular Joomla content management system are being urged by security experts to upgrade to the latest version after reports of exploits being used to compromise websites built on the platform. The SANS Internet Storm Center received numerous reports that...

New Linux Rootkit Emerges

A new Linux rootkit has emerged and researchers who have analyzed its code and operation say that the malware appears to be a custom-written tool designed to inject iframes into Web sites and drive traffic to malicious sites for drive-by download attacks. The rootkit...

Shamoon Malware Steals Data

A new piece of malware known as Shamoon that has the ability to destroy files on infected machines and overwrite the master boot record has researchers scratching their heads, wondering what the tool’s purpose might be and why the attackers behind it would...

YouTube launches face-blurring feature

YouTube launches new face-blurring feature to disguise identities   Google (GOOG) on Wednesday announced a new face-blurring tool for its video-sharing website YouTube. The site is the first to roll out such a feature, which is meant to protect the identity of...