Home

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!
SpaceBound Solutions Blog
How Teachers can incorporate 3D Printing into their Lesson Plans
Apr 5

Apr 5 How Teachers can incorporate 3D Printing into their Lesson Plans

Bob
3D Printing, Education

3D printing has made considerable advancements in the academic world. Here are ways educators can incorporate it into their classroom

UPDATE: A Teenager is reportedly the Mastermind behind Lapsus$
Mar 31

Mar 31 UPDATE: A Teenager is reportedly the Mastermind behind Lapsus$

Bob
Cybersecurity

Originally thought to be in South America, the mastermind behind Lapsus$ is actually suspected to be in England - although there are still ties to Brazil

Digital Extortion Gang Lapsus$ takes Credit for Microsoft, Okta Breaches
Mar 29

Mar 29 Digital Extortion Gang Lapsus$ takes Credit for Microsoft, Okta Breaches

Bob
Cybersecurity

The relatively new cybersecurity criminals have built up an impressive resume, despite researcher belief that they are not yet that well established

Emotet Malware is being packaged in a Fake IRS Email
Mar 24

Mar 24 Emotet Malware is being packaged in a Fake IRS Email

Bob
Network Security, Cybersecurity

The email includes a .ZIP file that is used to infect the victim’s computer and network

Firefox Users Asked to Upgrade after Two Zero-Day Vulnerabilities are Discovered
Mar 22

Mar 22 Firefox Users Asked to Upgrade after Two Zero-Day Vulnerabilities are Discovered

Bob
Cybersecurity

Mozilla acknowledged that they have had reports of “attacks in the wild”, but have not released more details

New FBI Warning details how you can protect yourself from “SIM Swapping”
Mar 10

Mar 10 New FBI Warning details how you can protect yourself from “SIM Swapping”

Bob
Cybersecurity

This dangerous technique can allow hackers to steal your information without even being involved

Six Email Security Trends to Pay Attention to in 2022
Mar 8

Mar 8 Six Email Security Trends to Pay Attention to in 2022

Bob
Cloud, Cybersecurity

Email is still used as one of the most common ways cybercriminals breach a network.

Instagram Accounts with High Follower Counts Targeted in Phishing Scheme
Mar 3

Mar 3 Instagram Accounts with High Follower Counts Targeted in Phishing Scheme

Bob
Cybersecurity, Social Media

The scheme sends a fake notice citing copyright infringement to steal user credentials

Joint Advisory Issued as “Sophisticated, High Impact” Ransomware Surges
Mar 1

Mar 1 Joint Advisory Issued as “Sophisticated, High Impact” Ransomware Surges

Bob
Cybersecurity

Agencies in the US, UK and Australia have released a joint advisory in response to a surge in ransomware attacks

The Cybersecurity Long Game
Feb 24

Feb 24 The Cybersecurity Long Game

Bob
Cybersecurity

4 cybersecurity experts with different perspectives weight in and give their insight on the future of cybersecurity

3 AI Trends to Watch for in 2022 K-12 Environments
Feb 22

Feb 22 3 AI Trends to Watch for in 2022 K-12 Environments

Bob
AI, Education

With AI and ML gaining traction in U.S. classrooms, here are 3 trends to look for in 2022

What is BlackCat Ransomware and why is it Different?
Feb 17

Feb 17 What is BlackCat Ransomware and why is it Different?

Bob
Cybersecurity

BlackCat is a cause for concern because it does more than just extort its victims for money.

If you installed this Malicious Android App, Delete it immediately
Feb 15

Feb 15 If you installed this Malicious Android App, Delete it immediately

Bob
Cybersecurity, Banking

The malicious app bypassed Google security and was available for download for 15 days.

New Android Malware Performs Factory Reset after Stealing your Money
Feb 10

Feb 10 New Android Malware Performs Factory Reset after Stealing your Money

Bob
Cybersecurity, Banking

The malware is spread through SMS that impersonates a banking institution.

What is a “Credential Stuffing” Attack and how can you defend against one?
Feb 8

Feb 8 What is a “Credential Stuffing” Attack and how can you defend against one?

Bob
Cybersecurity

This significant threat obtains user credentials to take advantage of victims for malicious purposes

FBI Warns of Cybercriminals Compromising QR Codes
Feb 3

Feb 3 FBI Warns of Cybercriminals Compromising QR Codes

Bob
Cybersecurity

QR codes have had a resurgence in popularity due to the pandemic, and cyber criminals are taking advantage

2021 was a Record Breaking Year for Data Breaches
Feb 1

Feb 1 2021 was a Record Breaking Year for Data Breaches

Bob
Cybersecurity

Although the number of people affected were down, cyber attacks rose 68% this year

Researchers Develop Technique to Detect Malware using Raspberry Pi without Software
Jan 27

Jan 27 Researchers Develop Technique to Detect Malware using Raspberry Pi without Software

Bob
Cybersecurity

This new malware detection technique can spot the presence of malware with 99.82% accuracy.

How your Small Business can protect Against Cyberattacks
Jan 25

Jan 25 How your Small Business can protect Against Cyberattacks

Bob
Cybersecurity

Phishing attacks and ransomware have a large impact on small business. Here’s how you can help protect against these threats.

5 Cybersecurity Trends that will Impact 2022
Jan 20

Jan 20 5 Cybersecurity Trends that will Impact 2022

Bob
Cybersecurity

With ongoing risk to both work-from-home and office environments, these are 5 important trends to familiarize yourself with in 2022.

Load More

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!

Powered by Squarespace