Blog

Are Some SSD Drives Susceptible To Hacking?

A research team has found an exploit that allows hackers to decrypt and view encrypted files on a number of well-known SSD drives.       They include: Samsung T5 Portable Samsung ...

Apple Adds Physical Security Feature To New MacBook

In recent months, hackers around the world have been finding new ways to invade people's privacy, hijacking an increasing number of cameras and microphones attached to smartphones and PCs.  Apple is responding ...

5 Reasons Why Your Company Should Outsource its IT Support

Companies commonly outsource its accounting and bookkeeping duties, customer service, and HR management… so why should technical support be any different? It shouldn’t. Outsourcing provides a lot of benefits, especially to ...

Another Intel Processor Vulnerability Found

Intel just can't seem to catch a break.  By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first ...

Video Embedding Feature In MS Word Has Security Vulnerability 

Researchers have discovered a security flaw in MS Office 2016 and older versions that leave the door open to hackers who can take advantage of it to run malicious code on a ...

Most Apple Devices Are Getting A Major Software Update

If you own Apple devices that use iOS, watchOS, tvOS, or macOS, there's good news.  The company just released major updates for all of those. They're available right now, and here are ...

iOS Gmail Users Will Be Able To Access Multiple Accounts

Earlier this year, Google introduced a new and improved Gmail that gave users virtually unlimited customization options. In addition to that, it included some exciting new AI-based features that cut down on ...

Yahoo Is Compensating Victims Of Their Massive Data Breach

Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, the company has recently agreed to pay $50 million in ...

Your Company’s Data was Hacked – Are You Legally Responsible?

So, who should be held responsible when a company’s data system gets breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over half ...

IBM Invests Billions To Purchase Popular Red Hat Linux

IBM has recently announced what is to be the largest open source acquisition in history.  They're buying Red Hat for a staggering $34 billion dollars.  This, as the saying goes, changes everything. ...

Blog

Passport And Credit Card Numbers Stolen In Marriott Hack

Passport And Credit Card Numbers Stolen In Marriott Hack

Recently, Marriott Hotels informed the world that they had been the victims of a massive data breach.  As it turns[...]
Page Caches May Be Vulnerable To Attack

Page Caches May Be Vulnerable To Attack

There's a new side channel attack to worry about. This one is after the target system's OS page cache, where[...]
High Quality Photos May Affect Facial Recognition On Some Phones

High Quality Photos May Affect Facial Recognition On Some Phones

One of the exciting new features offered by the latest smartphones is facial recognition, which allows users to unlock their[...]

Location

Tarzana

18520 Burbank Blvd, Suite #202
Tarzana, CA 91356
(818) 332-7930

Company

Computer Support Team is a leading provider of IT support and consulting, focusing on small and medium sized businesses in the San Fernando and Conejo Valley areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite