Blog
The Internet of Things – Part 2 of 2
In my last post, I opened a discussion on the Internet of Things, and loosely defined the category by breaking the devices down into two categories. This post is about the second of those two categories – those devices that are connected directly to the Internet. My favorite example from my own experience in this…
URGENT ALERT: Microsoft Announces Zero Day Word Exploit
Late last night, Microsoft announced a newly discovered exploit that is in the wild that allows remote code execution by merely previewing an email in Microsoft Outlook (without clicking on it or taking any other action). Although this has not been patched yet, Microsoft has issued a Fix It solution which will disable use of…
The Internet of Things – Part 1 of 2
There has been a lot of ballyhoo in the press lately about the Internet of Things. As we always try to do with this blog, we’ve attempted to wade through the noise and reduce the topic down to what matters to small and mid-market companies as it relates to technology strategy. For the purposes of…
New Worm Exploits Issue with Linksys Home Routers
Thanks to Mark Minasi (http://www.minasi.com) for bringing a new issue to our attention related to Linksys Home Routers. This is by FAR one of the most popular brands out there when it comes to home routers, so it is probably a good idea to check if one of these is in your house (or heaven…