Blog

bva_blackninja-tealbelt

BVA INC – IT Consulting Blog

Since 1993, BVA has delivered the highest quality in serving the IT consulting needs of small- and medium-sized businesses in Arizona and the greater Phoenix area, supporting them in maximizing the value of their information technology investments. We understand the impact that technology and computer networking services has on your business, and we are committed to your success.

Keylogger discovered on HP Laptops

 

“Keylogger’s are used in IT organizations to troubleshoot technical problems with computers and business networks. They can also be used to monitor the network usage of people without their direct knowledge; they are sometimes used as part of home parental controls. Finally, malicious individuals may use keyloggers on public computers to steal

Law enforcement has dismantled the Andromeda malware family

Law enforcement has dismantled the Andromeda malware family, which has been infecting computers since 2011. With the help of partners—including the FBI, Microsoft, and others—Europol intercepted the internet traffic between Andromeda-infected computers and the command servers to which the malware was communicating. All that traffic was then “sinkholed” and redirected to servers under the

Apple’s macOS High Sierra Root Bug Can Reactivate

According to an article published by PC Magazine, “Last week, Apple was left red-faced after it was discovered a bug in macOS High Sierra allowed anyone to gain root access to the system without a password. The company quickly released a security patch to fix the problem, but it also needed updating with an

How to get the most out of your Amazon Web Services?

How to get the most out of your Amazon Web Services?

Have you ever noticed that Amazon Web Services is not only cost effective, but helps organizations achieve scalability and reduced time to market. However, you may notice that these benefits can be lost in its IT infrastructure.

But by incorporating Amazon Web Services with SteelConnect it becomes a revolutionary application-defined SD-WAN

Are you at risk? BlueBorne Bluetooth Attacks

Did you know that you could be an easy target for hackers if your Bluetooth is turned on? No matter the device, you could be at risk.

 

Researchers at security firm Armis are warning users about a new attack vector leveraging Bluetooth that affects almost 5.3 billion devices across iOS, Android, Windows, and