Category Archives: Blog

Page Caches May Be Vulnerable To Attack

There’s a new side channel attack to worry about. This one is after the target system’s OS page cache, where a variety of sensitive data that has been accessed by the device’s owner is stored for rapid retrieval.  Perhaps the worst and most ominous aspect of this newly identified threat is the fact that it’s […]

High Quality Photos May Affect Facial Recognition On Some Phones

One of the exciting new features offered by the latest smartphones is facial recognition, which allows users to unlock their devices simply by looking at them.  On paper, it’s a great feature and incredibly convenient, but there’s a problem. The issue was uncovered by a non-profit group called the Dutch Consumentenbond, which tested more than […]

Flaws In Several Adobe Products Could Let Attackers In 

Two new critical flaws have been discovered in Adobe Acrobat and Reader that require your urgent attention. In fact, the flaws were rated as so severe that the company broke with its tradition of releasing security updates around the middle of the month in coordination with Microsoft’s “Patch Tuesday”. They released an update sooner this […]

Adware Continues To Be A Major Issue On Android Devices 

Google has been busy in recent weeks.  They’ve removed a staggering 85 apps from their Play Store when they discovered that they were pushing highly aggressive adware to the users who downloaded them. The apps the company removed were wearing a number of disguises, passing themselves off as everything from games, to remote control simulators, […]

Wannacry Ransomware Continues To Be A Problem For Some

It’s been the better part of two years since the outbreak of the Wannacry ransomware epidemic.  Unfortunately, all this time later, some companies are still dealing with the fallout.  According to the latest research, Wannacry is still infecting hundreds of thousands of computers around the globe. As grim as that sounds, it’s not all bad […]

New Internet Explorer Exploit Currently Being Used By Attackers

Are you still using Internet Explorer?  Now you have a new reason to consider switching to a more up to date browser. As most people know, Microsoft essentially gave up on Explorer after it failed to gain ground against its major competitors in the browser ecosystem.  They started fresh, with Microsoft Edge, designed as a […]

New Amazon Order Confirmation Emails Could Be Phishing Attempts

According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide.  To say that it gets a lot of traffic every day would be an understatement, which is why a newly discovered phishing campaign pretending to come from Amazon is so disturbing. Although Amazon sees heavy traffic every […]

Fusion Technology Solutions Selected for 2018 Top 25 Cloud Solution Providers

by CIO Applications Magazine Healdsburg, Jan 10, 2018 – Fusion Technology Solutions is proud to announce they have been selected by CIO Applications Magazine for their Top 25 Cloud Solutions providers 2018 list. The selection is based on the company’s dedication to providing customers with optimized cloud solutions and performance. The annual list of companies […]