SERVING Fort Worth
LIVE SUPPORT 24 | 7 | 365 CALL: (682) 282-4350

Archive for October, 2020

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft's DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen's Black Lotus Labs is working on something new. They ...

Adobe Patches A Number of Critical Vulnerabilities In Latest Update

If you make frequent use of Adobe products, then you'll definitely want to give priority to applying the latest security update offered by the company. It's an out of band patch that ...

New Windows 10 Update Shows App Warnings For Malware

A great many malware strains are designed to engage quietly during a PC's startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at ...

Latest Windows 10 Update May Block Third Party Drivers

If you haven't yet installed the latest Windows 10 or Windows Server update, here's something to be aware of before you do. You may not be able to update or install some ...

Microsoft Image AI Increases Accuracy To Rival Humans

Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, 'Terminator,' in which a computer network gained sentience and decided to do ...

Intel Adding Additional Security To Future Processors

Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and ...

Hacked Networks And Credentials Being Sold At Alarming Rates

Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According ...

Blog

A New iPhone Bug In HomeKit Could Brick Your Phone

A New iPhone Bug In HomeKit Could Brick Your Phone

Thank Trevor Spiniolas' sharp eyes if you own an iPhone.  The independent security researcher recently discovered a critical security flaw[...]
This New Malware Steals Passwords From Popular Browsers

This New Malware Steals Passwords From Popular Browsers

A new threat has appeared on the horizon. Even if the name is not familiar to you this malware strain[...]
Popular Digital Photo Company Shutterfly Hit By Ransomware Attack

Popular Digital Photo Company Shutterfly Hit By Ransomware Attack

Recently digital media giant Shutterfly was hit by a major ransomware attack. The attack disrupted broad swaths of the company's services[...]

Locations

Hurst (HQ)

1237 Southridge Ct Suite 208
Hurst, TX 76053
(682) 282-4350

Company

Outsourced CTO, Inc. is a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Fort Worth area. Our team has helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite