Your oldest Microsoft server is your weak link of your network

Microsoft server is your weak link
Microsoft server is your weak link

It’s time to inventory your network to identify systems to replace or migrate away from.

Maybe your future IT plans probably include testing and planning on Windows 10 and Windows 11 deployments. Your desktop deployments are relatively under control, but where are your server deployments?There are planty of evidence that recent desktop Windows updates are interacting with older unpatched platforms and causing undue hardship.

Flaw allows hackers to embed malware directly into source code

Trojan Source 1024x576.jpg

Nicholas Boucher and Ross Anderson, Cambridge University researchers, have discovered a new class of vulnerabilities that can be used by malicious actors to integrate visually deceptive malware directly into the source code of applications.

The technique, called “Trojan Source,” is a way to inject malware that is virtually invisible to human reviewers. To achieve this, a hacker would need to exploit certain subtleties in text encoding standards like Unicode to exploit target systems.

Car systems telematics will grow 19% over the next 5 years

cart telematics hud

The number of telematics using embedded systems is expected to grow a 19% from 133 million subscribers at the end of 2020 to 377 million by the end of 2026.

The latest research from IoT analyst firm Berg Insight, also points that global shipments of embedded car OEM telematics systems will grow from 41 million to 77 million units in the same time period, which represents an attach rate of 91%.