Atlanta Microsoft Expert
  • Home
  • About
  • Contact
  • Services (678) 365-9983
  • Thoughts on Tech
  • Customer
    • Login
    • Knowledge Base
Atlanta Microsoft Expert
  • Home
  • About
  • Contact
  • Services (678) 365-9983
  • Thoughts on Tech
  • Customer
    • Login
    • Knowledge Base

Steve Agnew

2 posts
Steve Agnew
  • April 29, 2023

Business Social MediaTwitter replacement BlueSky

  • No comments
🎉🚀 Exciting news, friends! Say hello to BlueSky, the new alternative to Twitter that’s been making waves in…
Steve Agnew
  • April 28, 2023

Data Protection & EncryptionBitlocker alone doesn’t protect you

  • No comments
BitLocker is a built-in encryption feature that helps protect your data on your computer in case it’s lost…
  • Business Social Media
  • Computer Storage
  • Data Protection & Encryption
  • Hardware
  • Tech Tips for Everyday Users

Latest Cyber Security News

  • Playing your part in building a safer digital world: Why cyberse...
    In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being...
    Published on: 2023-10-03
  • How Lazarus impersonated Meta to attack a target in Spain – Week...
    During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan...
    Published on: 2023-09-29
  • Lazarus luring employees with trojanized coding challenges: The...
    While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor...
    Published on: 2023-09-29
  • 5 of the top programming languages for cybersecurity
    While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles...
    Published on: 2023-09-27
  • Can open-source software be secure?
    Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?...
    Published on: 2023-09-26
  • ESET's cutting-edge threat research at LABScon – Week in se...
    Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups...
    Published on: 2023-09-22
  • Stealth Falcon preying over Middle Eastern skies with Deadglyph
    ESET researchers have discovered Deadglyph, a sophisticated backdoor used by the infamous Stealth Falcon group for espionage in the Middle East...
    Published on: 2023-09-22
  • OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipe...
    ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli organizations in 2021 and 2022...
    Published on: 2023-09-21
  • 10 tips to ace your cybersecurity job interview
    Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track....
    Published on: 2023-09-18
  • Ballistic Bobcat's Sponsor backdoor – Week in security wit...
    Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States...
    Published on: 2023-09-14
  • Read it right! How to spot scams on Reddit
    Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”?...
    Published on: 2023-09-13
  • ESET Research Podcast: Sextortion, digital usury and SQL brute-f...
    Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims...
    Published on: 2023-09-12

Atlanta Microsoft Expert
Designed & Developed by Atlanta Microsoft Expert (678) 365-9983