Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

CASS Tech Blog

CASS Tech has been serving the Farmington Hills area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

0 Comments
Continue reading

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

0 Comments
Continue reading

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

0 Comments
Continue reading

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

20-Year-Old Exploit Finds New Life as ROBOT

b2ap3_thumbnail_robot_threat_arrived_400.jpgThere is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

0 Comments
Continue reading

100 Countries Hit By Android DDoS Malware

b2ap3_thumbnail_skullwithoneandzero400.jpgIn what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

0 Comments
Continue reading

It’s Now Legal for ISPs to Sell Your Online Browsing History

b2ap3_thumbnail_congress_passes_data_law_400.jpgDue to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

0 Comments
Continue reading

$100 Million Hacking Incident Shows that No Company is Immune

b2ap3_thumbnail_giant_email_fraud_400.jpgIt’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

0 Comments
Continue reading

Don’t Assume Your New Device is Free of Malware

b2ap3_thumbnail_pre_installed_malware_400.jpgImagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

0 Comments
Continue reading

Tip of the Week: 5 Ways You Can Observe National Clean Out Your Computer Day

b2ap3_thumbnail_day_to_clean_out_your_pc_400.jpgDid you know? Today is National Clean Out Your Computer Day! As technology buffs ourselves, we want to spread the word about this annual opportunity to clean out the technology that your business uses on a daily basis. Here are five great ways to make sure that your computers are being properly maintained.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

b2ap3_thumbnail_android_issues_400.jpgA previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Galaxy Note 7: Now With Exploding Batteries!

b2ap3_thumbnail_galaxy_note_7_400.jpgSamsung has put out a global recall on their Galaxy Note 7 devices and a moratorium on any being sold after reports of exploding batteries came in. This recall--which is being considered the highest-profile recall in the history of consumer technology--comes at one of the worst possible times for the company, as they had just managed to gain some momentum after a run of mediocre mobile growth.

0 Comments
Continue reading

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

b2ap3_thumbnail_twitter_botnet_hack_400.jpgThere are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

0 Comments
Continue reading

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

b2ap3_thumbnail_updates_for_windows_10_400.jpgMicrosoft’s latest round of security patches includes 27 software vulnerabilities, many of which are critical in nature. Affected are widely-used titles such as Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s important for users to take action and install the Microsoft-provided patches, and soon.

0 Comments
Continue reading

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

b2ap3_thumbnail_hackers_get_acer_400.jpgIf you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen.

0 Comments
Continue reading

Google Condemns Adobe Flash to Online Oblivion

b2ap3_thumbnail_google_says_no_more_flash_400.jpgIn the wake of a dangerous zero-day vulnerability found in Adobe Flash, which required that users either uninstall it or update to the latest version, it’s becoming increasingly apparent that the web needs to find a new way to support rich media integration. Now, Google plans on slowly phasing out Flash in its web browser, Google Chrome, and switch to HTML5 as the default rich media player.

0 Comments
Continue reading

Review This Checklist to Make Sure You’re Not Running Recently Expired Software

b2ap3_thumbnail_end_of_life_microsoft_support_400.jpgEvery piece of software released by Microsoft has an expiration date. Known as the End of Life event, this is when Microsoft ceases to support the software. It’s imperative that you stay on top of EOL dates for the sake of your company’s operations and data security. Take for example the dozens of software titles that expired just this past April.

0 Comments
Continue reading

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

It’s Time to Move On: Microsoft Pulls the Plug on Internet Explorer 8, 9, and 10

b2ap3_thumbnail_upgrade_to_new_ie_400.jpgIf you’re still using Windows 8 (instead of the much improved 8.1), we’ve got bad news for you. Microsoft has ceased offering patches and security updates for the Windows 8 operating system, which means that if you want to be using the most secure and up-to-date operating system, you should make the switch to Windows 8.1 or Windows 10.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Latest Blog

The attack on SolarWinds earlier this year caused a lot of challenges, and now that time has passed and the dust has settled somewhat, Microsoft has uncovered another type of malware associated with the attack. This one is called FoggyWeb. ...

Contact Us

Learn more about what CASS Tech
can do for your business.

(248) 538-7374

CASS Tech
37000 Grand River Avenue Suite 130
Farmington Hills, Michigan 48335

Account Login