If We Do Use AI How Should Small Business do that?

Why should a small business (or any business) need AI to run xyz function? Let’s say you want to create proposals and have older proposals and current products and other info at hand. I.e. how long does it take to create a proposal without AI? Let’s say you have some institutional knowledge and it takes … Read more

AI browsers Security Called Into Question – Make it secure after breach?

Futurism.com has a story on how Perplexity AI browser is not very good with security concerns: The vulnerability, known as an indirect prompt injection attack, is terrifyingly simple. “The vulnerability we’re discussing in this post lies in how Comet processes webpage content,” the blog reads. “When users ask it to ‘Summarize this webpage,’ Comet feeds … Read more

19 year old Microsoft code needs to be Deleted All Windows Systems

CVE-2025-24990. Microsoft’s legacy code nightmare. A driver for old fax modems (ltmdm64.sys) has been quietly sitting on every Windows system since 2006. Possibly even Windows XP,  Windows 7, 10, 11, Server 2022, Server 2025. ALL of them. The driver was designed for hardware nobody uses anymore. Fax modems. Unfortunately it is designed to give full … Read more

What Makes Phishing so effective?

  There are some Docusign phishing attempts as catalogued here at Malwarebytes.com    How can one really tell that it is not a legitimate Docusign instead of a fake site or fake email Looking at the true email address from section shows where the email is coming from (not the email name “from:” that you … Read more

DPRK Actively Trying to Make Money on Our Businesses

As these FBI Images show and the text “2 DPRK Agents actively bilked almost a Million$”: Jin Sung-Il and Pak Jin-Song are wanted for their alleged involvement in a fraudulent scheme to obtain remote information technology (IT) work with U.S. companies that generated revenue for the Democratic People’s Republic of Korea (DPRK). It is alleged … Read more