Mike Foster's IT Security & Best Practices Blog

Latest Posts

Mac Vulnerability Permits Unauthorized Login

Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: 

Continue reading Mac Vulnerability Permits Unauthorized Login


A Secret Operating System is Running Inside Your Computers

If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now.

Continue reading A Secret Operating System is Running Inside Your Computers


Portable Radios Can Replace Family Phones

This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes.

Continue reading Portable Radios Can Replace Family Phones